Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Invitation Is All You Need: Invoking Gemini for Workspace Agents with a Simple Google Calendar Invite

Over the last two years, various systems and applications have been integrated with generative artificial intelligence (gen AI) capabilities, turning regular applications into gen-AI powered applications. In addition, retrieval augmented generation (RAG)-which is the process of connecting gen-AI and large language models (LLMs) to external knowledge sources-and other agents have been incorporated into such systems, making them more effective, accurate, and updated.

Insider Threat Statistics for 2025: Key Facts, Types of Incidents, and Costs

Understanding the current landscape of insider threats in cybersecurity is essential for any organization aiming to strengthen its security posture. As the nature of internal risks evolves, tracking the latest trends empowers security leaders to make smarter, more proactive decisions. In this article, we break down the latest research, share expert insights, and highlight real-world incidents to help you assess your organization’s vulnerabilities and refine your insider threat management strategy.

The life and death of an AI agent: Identity security lessons from the human experience

AI agents are on the rise. They can spin up, act independently, use tools, and make decisions—often without real-time human oversight. They promise incredible productivity but also introduce new risks and challenges that can’t be ignored. As these agents become more autonomous and integrated into enterprise operations, they blur the lines between human and machine responsibilities. This raises critical questions: How do we ensure they act ethically?

Social Engineering Attacks Surged in the First Half of 2025

Cybersecurity incidents nearly tripled in the first half of 2025, jumping from 6% in the second half of 2024 to 17% in 2025, according to a new report from LevelBlue. Business email compromise (BEC) remains the most common method for initial access, but non-BEC tactics rose by 214%. The researchers observed a major surge in social engineering attacks, driven by the recent popularity of the ClickFix tactic.

Beyond Traditional Defenses: Why French Cyber Resilience Needs to Improve

In today's world, cyberattacks are a constant threat. While technical defenses are crucial, people often remain the easiest attack vector for cybercriminals. To gauge the resilience of French employees against cyberattacks, we looked at the impact of security awareness training (SAT) and phishing simulations in strengthening their defenses. Our latest report, "Go Phish: How Susceptible Are French Employees To Malicious Attacks?", aims to provide some insight.

What Every MSP Ignores Until It's Too Late - The Recovery Gaps That Cost Clients, Confidence and Revenue

Most MSPs think they’re ready. They have backups. Maybe cloud syncs. Some monitoring. No major restore incidents… yet. But here’s the reality: MSPs don’t lose clients over support delays or feature gaps. They lose them when recovery fails silently, unexpectedly, and publicly.