Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Deploying Gen AI Guardrails for Compliance, Security and Trust

AI guardrails are structured safeguards, whether technical, security or ethical, which are designed to guide AI systems so they operate safely, responsibly, and within intended boundaries. Much like highway guardrails that prevent vehicles from veering off course, these measures ensure AI remains aligned with organizational policies, regulations, and ethical values.

The Data Sovereignty Debate Heats Up

The debate over data sovereignty spurred by the U.S. CLOUD Act is intensifying. On June 10, 2025, France’s Senate held a hearing on the role of procurement in data sovereignty, where Anton Carniaux, Director of Public and Legal Affairs at Microsoft France, testified. He stated he could not guarantee that data from French citizens would not be shared with U.S. authorities without explicit authorization from French authorities.

Why AI Infrastructure Growth Demands Next-Gen Cybersecurity and PAM

Global Artificial Intelligence (AI) infrastructure spending is projected to surpass $200 billion by 2028, according to research from the International Data Corporation (IDC). As organizations rapidly deploy more complex AI systems, the demand for high-performance infrastructure, like Graphics Processing Units (GPUs) and AI accelerators, is surging. This growth exponentially increases computing power, energy consumption and data exchange across hybrid and cloud environments.

Warning: Ransomware Attacks Surged by 63% Last Quarter

Ransomware attacks increased by 63% year-over-year in the second quarter of 2025, with a total of 276 publicly disclosed incidents, according to a new report from BlackFog. Notably, there were far more ransomware attacks that weren’t publicly disclosed. The researchers note, “The figures also reveal that the scale of hidden activity remains significant, with 80.9% of all ransomware attacks going unreported.

Bridging the Gap: Human Risk in African Cybersecurity

Africa's cybersecurity landscape presents a paradox: a widespread belief in preparedness among organisations, although significant blind spots continue to exist, particularly concerning their human layer - their employees. The KnowBe4 Africa Human Risk Management Report 2025, drawing insights from 124 senior cybersecurity decision-makers across 30 African countries, uncovers several concerns in the continent's cyber readiness.

How to Detect and Stop Fake Mobile Apps Before They Lead to Account Takeover

Fake apps are the latest evolution of brand impersonation, and they’re proving just as dangerous as phishing sites. Fraudsters clone legitimate mobile apps, publish them on official app stores, and trick users into entering credentials — which are then reused in the real app before anyone notices. Given that over 60% of web traffic is now mobile, this form of phishing-driven credential reuse has become one of the top blind spots in mobile fraud defense.

A New Chapter in Mobile Security: Tackling Human Risk with AI-Powered Social Engineering Protection

This week marks a milestone in the evolution of mobile endpoint security. At a time when attackers are moving faster and targeting smarter, Lookout is proud to unveil a breakthrough initiative: AI-powered social engineering protection—the first solution of its kind built to detect and disrupt human-targeted attacks at the mobile edge.

Redefining Accountability: How User Activity Monitoring Supports Remote Workforce Management

Hybrid work is here to stay, but visibility, consistency, and productivity aren’t keeping pace. Managers are left guessing who’s working effectively, which workflows are efficient, and where digital distractions or compliance risks may be hiding. Without complex data, accountability becomes reactive—or worse, arbitrary.