Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Cloudflare report warns of a 'Technical Glass Ceiling' stifling AI growth and weakening cybersecurity

New research shows that organisations modernising apps are 3x more likely to see AI payoffs, while those clinging to legacy systems face rising security risks and developer talent shortages.

The 2026 Security Roadmap: An Interview with Steve Van Till on SIA's Latest Megatrends

Like many in our industry, we wrapped up 2025 by digging into the Security Industry Association’s (SIA) annual megatrends report. Rather than just another predictions list, the 2026 SIA Security Megatrends report offers a strategic roadmap from industry trailblazers who have mapped out the specific shifts in physical security trends we can expect in 2026.

Website vs Device Defenses: How to Build a Modern Account Takeover Solution

Most account takeover solutions are built on a familiar assumption: if you can trust the device and secure the login, you can stop fraud. That assumption is no longer valid. Modern account takeover failures are driven by a structural issue most defenses still miss: the legitimacy gap. This is the period when access is treated as legitimate even though compromise has already occurred. During this gap, attackers operate freely while security and fraud teams see nothing actionable.

How Attack Surface Monitoring Improves Mean Time to Detect (MTTD)

Even with modern security tools, many organizations detect threats far too late. Attackers often operate quietly for extended periods because early warning signs go unnoticed. Exposed assets, forgotten services, misconfigured cloud resources, and unmanaged SaaS integrations rarely trigger immediate alerts. This delay increase means time to detect because security teams typically respond only after suspicious behavior reaches internal systems.

The missing piece of the CIA triad: Why 'availability' matters

We are often obsessed with who can see our data(Confidentiality) and how that data is protected from tampering (Integrity). While these are vital, there is a third pillar of the CIA triad that is currently under constant pressure: Availability. A recent Forrester survey revealed a startling reality: 76% of data breaches now affect availability, while only 42% impact confidentiality and 27% affect integrity.

2026 Insider Risk Predictions: What Organizations Must Prepare For

As 2026 unfolds, insider risk is being redefined by AI, behavioral analytics, and cross-functional accountability. The ability to predict risk based on behavior and intent, rather than react to outcomes, is reshaping how organizations defend against internal threats. Meanwhile, persistent factors like hybrid work continue to complicate visibility and oversight, amplifying risk across modern environments.

DORA penetration testing and threat-led exercises explained

The Digital Operational Resilience Act (DORA) introduces a unified framework for managing ICT risk across the European financial sector, with key requirements, including penetration testing, coming into force in 2026. Its aim is to ensure that regulated organisations, and the critical third-party providers they rely on, can withstand, respond to and recover from operational disruptions. Within this context, operational resilience and robust ICT risk management become central to regulatory expectations.

Alert Fatigue Is Killing Your SOC. Here's What Actually Works in 2026.

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo Your SOC received 10,000 alerts yesterday. How many were real threats? Most SOC teams operate in a constant state of triage. Alerts pour in from dozens of tools, each one demanding attention, each one potentially critical. The reality? Your analysts are making high-stakes decisions about which alerts to investigate based on gut instinct and whatever time they have left in their shift.

54 New NPM Packages Found Beaconing to C2 Server in Ethereum Smart Contract

Jan 13, 2026 Vibe Coding and GenAI Security: Balancing Speed with Risk Read More Natalie Tischler Jan 8, 2026 Top 10 Challenges in DevSecOps Adoption Read More Natalie Tischler Jan 6, 2026 Looking Ahead at 2026 with Gartner: How Smarter Teams and Tools Are Making Application Security a Breeze Read More Joe Ariganello.