Increase by 61%! Yes, nearly 2/3rd of organizations experienced a cloud security incident in 2025, a significant increase ...
With over 20 years of experience in data, application, and cloud security, James is a passionate and driven cyber security ...
In 2025, stolen credentials remain the most common and fastest path into an organization’s systems. Nearly half of breaches begin with compromised logins.
AttackIQ presents the fifth volume of Ransom Tales, an initiative focused on emulating the Tactics, Techniques, and ...
The enterprise IT perimeter dissolved years ago, taking with it any illusion that security teams can dictate which ...
Closing the Zero Trust gap means extending its principles to the file layer, the point where most attacks ultimately take ...
CEO of WWPass, a global provider of secure authentication and data management solutions. With more than 30 years of leadership in technology and IT services, he is committed to advancing security, ...
Alastair has made a twenty-year career out of helping people understand complex IT infrastructure and how to build solutions that fulfill business needs. Much of his career has included teaching ...
Next week our founder Simon Moffatt will be hosting two panels at the Future Identity Festival in London. The two day event hosted an array of stages focused on financial services and fraud, identity ...
The enterprise migration to the cloud has created a security paradox. While digital transformation and multi-cloud architectures promise agility, they ...
Moving Beyond the Hype Security does a great job of sensationalizing attacks. This trend was set from a perspective of ...
Spektrum Labs is providing early access to a platform that enables cybersecurity and IT teams to mathematically prove they have achieved cyber resilience.