Articles – Information Security Buzz Information Security News With Experts Analysis
- Who’s Really Knocking? Deepfakes, AI, and the New Era of Identity Fraudby Andrew Hartnett on November 26, 2025 at 8:28 am
In early 2024, a finance director at a multinational company in Singapore joined what appeared to be a routine video call with senior colleagues. The CFO was there. The leadership team was there. Every face and voice felt familiar. Yet none of them were real. Within minutes, the director had approved a transfer of nearly […]
- No Identity, No Trust: Governing AI in the Age of Autonomyby Jordi Clement on November 13, 2025 at 10:32 am
In early 2024, a financial services company discovered their AI customer service agent had accessed and potentially exposed sensitive account information when users employed specific prompt techniques. The breach went undetected for weeks because no one had defined what data the agent should—or shouldn’t—access. This incident illustrates a critical reality: as AI becomes embedded in […]
- Taking Control: The ‘Triple A’ Approach to Resilienceby Bhooshan Thakar on November 13, 2025 at 9:19 am
Technology downtime is an unavoidable reality. Globally, online downtime is estimated to cost companies $400 billion per year. Whether it stems from human error, software bugs, acts of nature, or scheduled maintenance, it happens. Regardless of the cause, the repercussions can be devastating. Operations can grind to a halt, productivity plummets, revenue streams slow down, […]
- Medium Difficulty, Maximum Impact: How Challenge Design Drives Application Security Outcomesby Jose Lazu on November 11, 2025 at 8:25 am
In application security training, difficulty level matters. If the content is too simple, learners will breeze through without gaining real skills. If it’s too difficult, they feel stuck and become frustrated. When challenges strike, the right balance of training can deliver measurable improvement across the board. That’s one of the central findings from our 2025 […]
- 7 Low-Cost Strategies for Ransomware Prevention in Healthcareby Zac Amos on November 6, 2025 at 11:30 am
The increasing sophistication and frequency of ransomware attacks pose a significant threat to healthcare organizations, creating huge financial burdens and operational disruptions. The answer is not extravagant tooling. A consistently executed, disciplined set of fundamentals can break common kill chains, shrink the attack surface, and hasten recovery. Below are seven practical, budget-friendly moves to implement […]
- What Shai-Hulud is Telling Us About The State of the Modern Software Supply Chainby Brad LaPorte on November 5, 2025 at 8:49 am
A self-propagating malware campaign is actively compromising the NPM ecosystem, and while it’s undeniably dangerous, many experts believe it’s not getting the attention it deserves. Known as Shai-Hulud, this attack has dominated headlines for the companies caught in its path,but the real story lies in what it reveals about the fragility of the modern software […]
- Evidence Beats the Odds: How Exposure Validation Reframes Security Decision-Makingby Süleyman Özarslan on November 4, 2025 at 7:49 am
Inside many security programs, security teams are handed a finite stack of chips — time, staff, and budget — and are expected to make smart bets on where threats might emerge. Each decision is guided by theoretical risk scores like CVSS and EPSS, which label a high volume of vulnerabilities as urgent but offer little […]
- The Hidden Superpower of Policy in Vulnerability and Patch Managementby Gene Moody on November 3, 2025 at 8:39 am
What’s the first thing you think of when you hear “vulnerability management”? The focus may be on tools, CVSS scores, and patch counts. It makes sense: tools are easy to point to, and scores can give security professionals an illusion of measurability. But what most people never think of is policy. It’s an afterthought. I’m […]
- The Business Cost of Identity Friction in Partner Onboardingby Jose Caso on October 29, 2025 at 7:49 am
In business, time is money. Nowhere is this truer than in the first days of a new partnership. When a supplier, distributor, or contractor joins your ecosystem, the speed at which they are onboarded determines how quickly they can begin contributing value. Yet too often, the process drags. Access is slow. Verification is unclear. Authentication […]
- Under the Surface: Subtle Ways Cyberattacks Cripple Manufacturingby Lou Farrell on October 24, 2025 at 9:24 am
Cyberattacks in the manufacturing sector are evolving faster than many organisations can adapt. While high-profile threats like ransomware and DDoS attacks dominate the headlines, subtle and less visible tactics can quietly disrupt production, damage reputations, and even compromise safety. 1. Third-Party Infiltration Makes Seeking Outside Assistance Perilous Businesses often rely on third-party vendors to provide […]







