Why browser security is increasingly essential for the enterprise [Q&A]

Man working on computer laptop with triangle caution warning sig

As enterprises embrace hybrid work, SaaS applications, and AI tools at unprecedented scale, one critical access point is being increasingly targeted by attackers: the browser.

To better understand the risks and what can be done to secure the browser, we spoke with Alon Levin, vice president of product management at Seraphic Security, and an expert in enterprise browser security.

Continue reading

The rise of vishing and why enterprises need to be ready [Q&A]

Unknown spam fraud phonecall

Vishing (voice phishing) attacks have surged by over 1,600 percent so far this year, partly driven by a rise in AI-driven deepfake voice scams.

This is yet another way cybercriminals are seeking to impersonate those with access to company systems to disrupt organizations and hold data for ransom. We spoke to Anthony Cusimano, solutions director at Object First, to discover more about this trend and how businesses are at risk.

Continue reading

Hackers weaponize GenAI to boost cyberattacks

AI security attack

Adversaries are weaponizing GenAI to scale operations and accelerate cyberattacks -- as well as increasingly targeting the autonomous AI agents reshaping enterprise operations. This is among the findings of CrowdStrike’s 2025 Threat Hunting Report.

The report reveals how threat actors are targeting tools used to build AI agents -- gaining access, stealing credentials, and deploying malware -- a clear sign that autonomous systems and machine identities have become a key part of the enterprise attack surface.

Continue reading

Companies pay multiple ransoms as attackers step up threat levels

Ransomware money

A new report from Semperis, based on a study of almost 1,500 organizations globally, shows that hackers are stepping up threat levels and ransomware is still a global epidemic.

In 40 percent of attacks threat actors threatened to physically harm executives at organizations that declined to pay a ransom demand. US-based companies experienced physical threats 46 percent of the time, while 44 percent of German firms experienced similar forms of intimidation.

Continue reading

Almost half of enterprises not prepared for quantum threats

Post-quantum security

A new report looks at the state of post-quantum cryptography (PQC) from the perspective of
cybersecurity professionals, finding that 48 percent of organizations aren’t prepared to confront the urgent challenges posed by quantum computing.

The report from Keyfactor, based on a survey of 450 cybersecurity leaders across North America and Europe carried out by Wakefield Research, finds mid-sized organizations are particularly vulnerable, with 56 percent saying they are not ready.

Continue reading

Navigating the hidden dangers in agentic AI systems [Q&A]

Agentic AI

According to Gartner 33 percent of enterprise applications are expected to incorporate agentic AI by 2028, but are their security teams equipped with the latest training and technology to protect this new attack surface?

We spoke with Ante Gojsalić, CTO and co-founder at SplxAI to uncover the hidden dangers in agentic AI systems and what enterprises can do to stay ahead of the malicious looking to exploit them.

Continue reading

New ‘hardened runtime’ standard aims to make organizations more secure

Cyber Security lock icon Information Privacy Data Protection internet and Technology

Traditional runtime security solutions have tended to focus on detection and as a result generate thousands of low-fidelity alerts. Edera is launching what it says is a new software security category aimed at ending the era of 'move fast and break things'.

Edera's ‘hardened runtime’ provides production-grade sandboxing that assumes a breach before it occurs. This architectural approach eliminates the root causes of privilege escalation, lateral movement, and data exfiltration while dramatically reducing operational overhead for security teams.

Continue reading

Privileged access management is key to enterprise defense

public cloud access

New survey data reveals that 49 percent of organizations with privileged access management report fewer security incidents tied to privilege misuse.

The report from Keeper Security, based on a global survey of 4,000 IT and security leaders in the United States, Europe and Asia, explores the motivations driving PAM adoption, the most common obstacles to deployment and the features enterprises consider essential for securing access in today’s cybersecurity threat landscape.

Continue reading

60 percent of enterprise firewalls fail critical checks

New research from FireMon shows that 60 percent of enterprise firewalls fail high-severity compliance checks immediately upon evaluation, with another 34 percent falling short at critical levels.

Using data collected anonymously from AI-powered analytics platform FireMon Insights deployments across large enterprises and regulated industries, the study found misconfigurations, outdated rules, and bloated policies that bog down performance and leave security teams struggling to keep up.

Continue reading

Millions of unsecured Wi-Fi networks are putting data at risk

Network wi-fi threats

New threat intelligence from Zimperium reveals over five million unsecured public Wi-Fi networks have been detected globally since the beginning of 2025, with a staggering 33 percent of users still connecting to these open networks, putting enterprise data at risk in the process.

Mobile devices are now a primary gateway to corporate data, but during travel, they’re also the most vulnerable,” says Kern Smith, VP of global solutions  at Zimperium. “Unsecured Wi-Fi, phishing disguised as travel alerts, and risky sideloaded apps are creating an ideal attack surface for cybercriminals -- especially in peak travel months.”

Continue reading

Microsoft to stop adding new features to Office apps for Windows 10 users

Microsoft building

As we are being reminded on a near daily basis, Microsoft is ending support for Windows 10 in mid-October. The company has made it clear that the end of support means the end of security updates, but this does not mean that all Windows 10 users will take notice and jump to Windows 11.

However much Microsoft might wish otherwise, Windows 10 will remain in popular usage for some years to come – so the company is tightening the thumbscrews. A quiet announcement reveals that anyone sticking with Windows 10 will no longer receive feature updates for their Microsoft 365 (Office) apps.

Continue reading

OT security becomes a board priority for enterprises

The factory automated conveyor shop on production of strawberry jam.

Operational technology (OT) can often be a cybersecurity weak spot for enterprises, relying as it does on older hardware and operating systems that are hard to update.

It’s no surprise then that a new report from Fortinet shows there has been a significant increase in the global trend towards corporations planning to integrate cybersecurity under the CISO or other executives.

Continue reading

Enterprise tech executives cool on the value of AI

Double exposure of technology hologram with man working on computer background. Concept of big data.

Although enterprise AI investment continues to accelerate, executive confidence in the strategies guiding this transformation is falling according to a new report.

The research from Akkodis, looking at the views of 500 global Chief Technology Officers (CTOs) among a wider group of 2,000 executives, finds that overall C-suite confidence in AI strategy dropped from 69 percent in 2024 to just 58 percent in 2025. The sharpest declines are reported by CTOs and CEOs, down 20 and 33 percentage points respectively.

Continue reading

AI is quietly taking over enterprise cybersecurity -- this is what you need to know

AI cybersecurity

AI is reshaping how companies protect themselves against cyber threats, according to new research from ISG Software Research.

Enterprises are building layered cybersecurity defense systems that combine access controls, endpoint monitoring, and data recovery, and artificial intelligence is helping these systems adapt faster and work more effectively.

Continue reading

Why Active Directory remains a popular target for attackers and what to do about it [Q&A]

AD Active Directory - Inscription on Green Keyboard Key.

Microsoft Active Directory (AD) turned 25 earlier this year -- remarkable longevity in the technology world. It’s the identity backbone for more than 80 percent of enterprises, meaning a breach could be catastrophic.

We spoke to Sean Deuby, principal technologist at Semperis, to look at the top considerations for protecting AD for the future, as most organizations he talks to have no plans to move on from the aging technology.

Continue reading

Load More Articles