Blog

47 Results / Page 1 of 6

Background
AI Prompt risk

todayMarch 5, 2026

close

Blog Dylan Howard

AI Prompt Risk: The Hidden Threat Inside Business Workflows

As organizations race to integrate AI assistants and copilots into everyday work, a new class of risk is quietly taking root: AI prompt risk — the accidental exposure, manipulation, or misuse of sensitive data through the prompts employees type into AI systems. It’s not hypothetical. In enterprise environments today, risky prompts ...

todayFebruary 27, 2026

close

Blog Tanner Shinn

Why EDR Alone Can’t Stop Credentialed Attacks

EDR Is Great… But What Stops an Attacker Who Never Drops Malware? Endpoint Detection and Response (EDR) is essential in any modern Windows environment. That part isn’t up for debate. If you operate Windows endpoints at scale without EDR, you are vulnerable to commodity threats by default. But the problem ...

todayFebruary 20, 2026

close

Blog Jonathan Kimmitt

Managing Privacy Compliance Requirements for AI Implementation in Your Organization

Artificial Intelligence is entering organizations faster than privacy programs can adapt. Teams are using AI to summarize documents, analyze spreadsheets, draft communications, and automate workflows—often without realizing they are moving regulated data into systems that were never considered in the original privacy design. The issue is not that AI creates ...

Human‑Centered AI in Digital Forensics: Keeping the Experts in Control

todayJanuary 30, 2026

close

Blog Will Arnett

Human‑Centered AI in Digital Forensics: Keeping the Experts in Control

How do we use AI responsibly, effectively, and defensibly — without losing the human expertise that makes digital forensics unimpeachable? AI tools are reshaping the way modern digital forensics cases are being handled. But rather than becoming reliant on these tools, forensic investigators need to be diligent in checking the work of such tools keeping AI “human-centered”. Yes, ...

SOC Best Practices for 2026

todayJanuary 14, 2026

close

Blog Andrew Hickman

SOC Best Practices for 2026: Strengthen Defenses, Boost Efficiency, and Prepare for AI Threats

As we kick off 2026, Security Operations Centers (SOCs) face a threat landscape that is more dynamic and sophisticated than ever. The rapid adoption of AI by both defenders and attackers, persistent supply chain vulnerabilities, evolving ransomware tactics, and geopolitical tensions are reshaping how we detect, respond, and recover from ...

What are the most important cybersecurity priorities for CISOs in 2026?

todayJanuary 2, 2026

close

Blog Jonathan Kimmitt

Essential CISO Checklists for 2026: Top Cybersecurity Priorities for Security Leaders

In 2026, CISOs should prioritize governance and strategy, identity security (IAM), AI‑driven detection and response, ransomware resilience, third‑party risk, cloud security, OT protection, cyber insurance and legal preparedness, workforce training, and personal leadership to build a resilient, compliant, and board‑aligned security program. Who this is for: CISOs, Deputy CISOs, security leaders, and executive ...

Cybersecurity Trends for 2026: Why resilience beats technology alone.

todayDecember 9, 2025

close

Blog Jonathan Kimmitt

Cybersecurity Trends for 2026: Why Resilience Beats Technology Alone

If 2025 exposed anything, it’s that attackers are scaling faster than organizations are adapting. The lesson heading into 2026 is clear: resilience is now the true differentiator. Technology alone won’t bridge the gap. Compliance alone won’t close it. What organizations choose to prioritize in 2026 will determine whether they stay ahead ...

Cybersecurity 2025 Year in Review

todayNovember 27, 2025

close

Blog Jonathan Kimmitt

2025 Cybersecurity Year in Review: Key Insights from a CISO on Major Security Trends and Headlines

Why 2025 Was a Turning Point for Cybersecurity Looking back at 2025, the headlines were relentless: airports disrupted, Fortune 500 companies scrambling, supply-chain breaches rippling across industries, and lawmakers debating how much regulation is “too much.” But when you step back and study the year’s biggest stories collectively, a clearer ...

Delaying Security? Here Are the Conversations Your Organization Is Accidentally Having With Attackers.

todayNovember 20, 2025

close

Blog Jonathan Kimmitt

Delaying Security? Here Are the Conversations Your Organization Is Accidentally Having With Attackers

Every organization has reasons – sometimes practical, sometimes emotional – for delaying security investments. Budgets, convenience, and growth priorities often take center stage, while security gets pushed to “later.” But attackers don’t operate on your timeline. They don’t wait, negotiate, or care about internal challenges. In fact, the very excuses businesses use ...