Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft to Enforce Mandatory MFA for Azure and Microsoft 365 Admin Accounts

Microsoft has also been enhancing cloud security by ensuring that multi-factor authentication (MFA) is enabled for all of its Azure and Microsoft 365 administrative accounts. The rollout will begin with Azure portals in October 2025 and progressively to command-line tools, APIs, and Infrastructure-as-Code (IaC) environments in October of that year. For organizations, it means adapting their authentication workflows to align with Microsoft’s phased enforcement plan or risk disruption.

How Tines gets agentic automation right

At the RSAC Conference this year, it seemed that every cybersecurity company had suddenly become an agentic AI company. According to such vendors, AI agents were the solution to every security problem keeping CISOs up at night. The audience, however, was understandably skeptical. Concerns over vendor promises fell into two camps. The first camp: companies that took whatever AI capabilities they had and slapped the word ‘agentic’ on them (aka ‘agent-washing’). Or even worse.

CrowdStrike Named a Leader in The Forrester Wave: Managed Detection and Response Services in Europe, Q3 2025

CrowdStrike has been named a Leader in The Forrester Wave: Managed Detection and Response (MDR) Services in Europe, Q3 2025. In this evaluation, CrowdStrike received the highest possible scores in 16 criteria, including endpoint detection surface, identity detection surface, cloud detection surface, managed response: manual and automated, threat hunting, analyst experience, vision, and innovation.

What You Need to Know about the TransUnion Data Breach

Initially established in 1968, TransUnion was set up as a holding company for the Union Tank Car organization. It entered the credit reporting industry in 1969, following an acquisition of the Cook County Credit Bureau. Over time, TransUnion developed from solely credit reporting to information and insights on a global scale. The official mission of the company is to help people globally access capital and services, thereby emphasizing its role as a consumer advocate.

From Prompt Injection to a Poisoned Mind: The New Era of AI Threats

In our last post, we introduced the Model Context Protocol (MCP), the "brain" or "mission briefing" that guides an AI agent's actions. Most security teams are just getting familiar with prompt injection, the equivalent of tricking an AI with a single, misleading command. But that's like stopping a pickpocket at the door when a master spy is already inside, rewriting the mission plans. As AI agents become autonomous, the attacks become more profound.

When AI skips the app layer: Welcome to the OS Hunger Games

Remember when we thought the application layer was where all the fun happened? Firewalls, WAFs, EDR, dashboards galore — the entire security industrial complex built around watching what apps do. Well, with “agentic AI” running the show, that middle ground is turning into a bypass lane. Instead of clicking through UIs or APIs, your AI buddy is making direct system calls, automating workflows at the OS and hardware level.

Tales from the fraud frontlines: The silent surge in rogue payment terminal fraud - and how to fight back

Picture this: Unusual card-present transactions, processed through a POS tap terminal that shouldn’t even exist on your network, suddenly light up your fraud-monitoring dashboard. Your heart sinks as you realize you’re dealing with something far more dangerous than a stolen card. It turns out that a rogue terminal has been siphoning funds — and evading detection — for days.

AI-Ready AEC: Building a Smart Digital Foundation With Autodesk and Egnyte

Every week, I hear from firms eager to explore how artificial intelligence can speed up workflows, improve quality, and unlock new ways of working. But here’s the reality: AI is only as good as the data behind it. Without a solid foundation of structured, governed, and secure information, AI’s potential quickly crumbles.