10 Cybersecurity Predictions: SpyCloud Identifies Identity Threats That Will Dominate 2026

Think of these cybersecurity predictions like a city planner’s warning about a neighborhood with too many spare keys, too many new tools for thieves, and too many people leaving their windows open. Teenagers with lockpicks roam the alleys. Hackers use AI the way a magician uses sleight of hand. Some break in pretending to be … Read more

Artificial Intelligence Report: Only 44% Ready to Support Secure AI, Delinea Finds

Artificial Intelligence (AI) adoption is surging; check that, it has surged and continues to do so. Whether this results in a gold rush or leaves hands full of fool’s gold remains to be seen. Regardless of that, the rush is on, and cybersecurity readiness lags. Delinea’s new report, “AI in Identity Security Demands a New … Read more

FAMOUS CHOLLIMA Unmasked: Insights from the 2025 CrowdStrike Report

North Korea satellite map with flag overlay; FAMOUS CHOLLIMA, DPRK fake IT workers, morphing identities, generative AI insider threat.

Chollima: Culture, Symbol, and Global Reach – There are reports today that North Korea is engaged in an AI modernization of its military. The reporting includes these apparent orders: “make plans to build AI-based manned and unmanned multipurpose combat systems.” With that and constant talk of fake IT workers tied to North Korea, and artificial … Read more

Ransomware Payments Fail Half the Time – CyberEdge Group’s Startling Report

The CyberEdge Wake-Up Call If you can’t trust a cybercriminal, who can you trust? The 2025 Cyberthreat Defense Report (CDR) by CyberEdge Group exposes a harsh truth. Victims who make ransomware payments only recover data half the time. That’s right, more than 45% of organizations don’t recover data and walk away empty-handed. Based on a … Read more

The Identity Security Imperative: Why Businesses Must Secure Every Identity Now

In today’s digital landscape, identity security is paramount. The dramatic increase of both human and machine identities has changed the rules of cybersecurity. They are how attackers target credentials and access points as their primary method of intrusion. CyberArk’s The Identity Security Imperative: A Leader’s Guide to Securing Every Identity presents a stark reality—identity-based attacks … Read more

×