Blogs

Fresh thinking, practical ideas, and perspectives that matter.

Past

Upcoming

Identity as the target: Resurgence of Microsoft 365 credential harvesting via QR‑code phishing

Past

Upcoming

Evolving cyber threat landscape amid Middle East tensions

Past

Upcoming

The Big Shift: Demystifying Cyber Agentic AI (CA2)

Past

Upcoming

Moltbook: The rise of agent native AI and a new class of threats

Past

Upcoming

Identity and Access Management in the age of AI and autonomous agents

Past

Upcoming

Uncovering the Chinese APT Group .Net Malware Payload – Part 2

Past

Upcoming

Uncovering the Chinese APT Group .Net Malware Payload – Part 1

Past

Upcoming

Enabling visibility and monitoring for ICS networks: Fortifying cybersecurity and streamlining operations

Past

Upcoming

How to secure your Microsoft Exchange Hybrid Environment for 2026

Past

Upcoming

How AI empowers Zero Trust Architecture in network security