Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Your Guide to Cybersecurity Awareness Month 2025

October is here, and this means it is Cybersecurity Awareness Month (CSAM). Technology continues to advance at lightning speed, so protecting your digital life has never been more critical.‍ These blogs will walk you through the four CSAM themes designed to help you strengthen your defenses, protect your identity, and keep your family, friends and colleagues safe online.‍

What is Agent2Agent (A2A) Protocol and How to Adopt it?

Imagine autonomous agents negotiating and acting on your behalf—no manual hand-offs, just an efficient, policy‑driven communication. That’s the promise of Google’s Agent2Agent (A2A) Protocol, unveiled at Google Cloud Next in April 2025. Developed with input from over 50 partners, A2A is now open-sourced under the Apache 2.0 license and governed by the Linux Foundation.

Going DEEP: A Simple Framework for a Complex Problem

In our previous blog post, we discussed the behavioral science behind why people click on malicious links. So far in this series, we’ve established that our old security playbooks are broken and that we’re dealing with the complex psychology of the human brain. Trying to tackle that all at once can feel like herding cats. What we need is a simple, memorable mental map to bring structure to the chaos. Let’s go DEEP.

Building Trust in AI: KnowBe4's Journey Toward ISO 42001 Certification

At KnowBe4, everything we do is built on a foundation of innovation and trust. As we bring more artificial intelligence (AI) into our human risk management platform, we believe it’s essential to be transparent and responsible every step of the way. That's why we're proud to announce that we are pursuing ISO 42001 certification, the world's first standard for managing AI systems.

When AI agents become admins: Rethinking privileged access in the age of AI

From resetting passwords and approving workflows to pulling HR data and orchestrating cloud infrastructure, AI agents now perform tasks that previously required a human with privileged access. AI has moved beyond the realm of passive chatbots into autonomous, persistent operations, performing work on behalf of an individual or entity. Like it or not, that makes AI agents a new part of your workforce. They hold credentials, trigger workflows, and make their own decisions.

10 Intelligence-Focused Questions That Strengthen GRC-SOC Collaboration

The Governance, Risk, and Compliance (GRC) team and the Security Operations Center (SOC) shouldn’t be working in silos. Yet in many organizations, these teams operate with different data, priorities, and goals, missing a critical opportunity to strengthen the organization’s overall resilience. When GRC and SOC collaborate, the organization is better prepared, whether it’s responding to a real-world attack, passing an audit, or navigating the daily chaos of the cyber threat landscape.

A guide to understanding the UK Cyber Security and Resilience Bill

The UK government is strengthening its cybersecurity legislation with the Cyber Security and Resilience Bill (CSRB), an update to the 2018 Network and Information Systems Regulations. Modelled on the EU’s NIS2 Directive, the new Bill significantly expands cyber risk obligations across the UK’s digital ecosystem, targeting gaps exposed by recent high-profile breaches.

Web Application Firewalls (WAFs): A false sense of security?

Web application firewalls (WAF) is a protection mechanism to help block potential malicious requests before they can reach the application itself. Often this is implemented as a proxy, intercepting HTTP requests, analyzing them, and finally deciding on an action. While effective, over relying on it could lead to a false sense of security that allows attackers to exploit unresolved internal issues.

From raw data to real-time defense: A conversation with John Hammond

Explore how Elastic Security's unified platform with SIEM and XDR protections transforms SOC workflows through AI-powered analytics and consolidated security operations. Elastic Security Director of Product Management James Spiteri recently joined cybersecurity researcher, educator, and content creator John Hammond for an in-depth technical demonstration. John spends his days analyzing malware, breaking down attacker techniques, and making hackers earn their access.

CrowdStrike's Fall 2025 Release Defines the Agentic SOC and Secures the AI Era

We are living through the fourth industrial revolution: the age of AI. Just as with the steam, electricity, and the digital revolutions that preceded it, this leap forward requires a parallel leap in security. AI is transforming how businesses operate and how adversaries attack. They are moving at machine speed, compressing the defender’s response window from weeks to mere seconds.