Featured Post

AI for Security Infrastructure: Rebalancing Cybersecurity for the Decade Ahead

For more than a decade, cybersecurity has been shaped by a single doctrine: assume breach. Facing high-volume, relentless, and diverse attacks, the security industry has been forced into a reactive stance, playing a constant game of whack-a-mole in a nonstop damage-limitation exercise. This has driven major investment in detection, response, and recovery, and created a world in which organizations are better at reacting to incidents than at preventing them in the first place.

Starting the Year with Cyber Intention: Human-Centric Insights from the Global Cybersecurity Outlook 2026

One of my first intentional “to-dos” this year has been spending time with the World Economic Forum’s Global Cybersecurity Outlook 2026, a report I was privileged to actively contribute to over the past year. For KnowBe4 customers, this report offers more than trend analysis. It provides a baseline of where organizations stand today, what separates resilient organizations from less resilient ones, and why the human factor is now central to cyber resilience.

The Dangerous Reason CISOs Get Sidelined

Security leaders are not ignored because governance or risk no longer matter, they are sidelined because speed and efficiency are treated as the only metrics that count. AI is sold as a competitive edge, so any warning about second order effects sounds like friction, even though speed without control creates asymmetric risk that grows out of sight.

Why is cybersecurity getting so expensive?

Cybersecurity is pricing itself out of reach. Over the past eight years, private equity and VC acquisitions have driven massive price increases across security consulting, vendor products, pentesting and compliance services. SMBs are struggling with vendor renewals climbing up to 40% while security budgets can't keep pace. From endpoint security to SIEM solutions, baseline cybersecurity is becoming unaffordable for the organisations that need it most.

What is vendor compliance, and why does it matter?

Modern organizations depend on a vast network of third-party vendors to deliver their products and services, often outsourcing logistics like manufacturing and customer support. While this promotes scalability and innovation, relying on external parties can create blind spots in data security, regulatory compliance, and risk management. ‍ These gaps exist because vendors often don’t operate under the same policies and ethical standards as the organization with which they collaborate.

Chasing digital ghosts across modern IGA environments

In Pac-Man, ghosts seem pretty easy to dodge. You’re clearing the maze, racking up points, three more pellets away from leveling up. Then, out of nowhere, they close in and cut off all hope of escape. Womp womp. Game over. In today’s enterprise environments, “ghost” or orphaned accounts represent a similar hidden risk. They appear low-impact, lingering in forgotten corners of the IT maze.

Episode 7 - Practical AI for Zeek, MITRE, and Security Docs

In Episode 7 of Corelight DefeNDRs, join me, Richard Bejtlich, as I sit down with Dr. Keith Jones, Corelight's principal security researcher, to discuss the practical applications of AI in enhancing network security. We delve into how large language models (LLMs) can assist in cleaning up documentation and generating Zeek scripts, sharing insights from our extensive experience in incident response and coding. Keith reveals the challenges and successes he has encountered using LLMs to streamline processes, including their role in analyzing MITRE techniques.

The Private Equity Problem in Cybersecurity

This one's going to ruffle some feathers. Over the past eight years, something has fundamentally changed in the cybersecurity industry. Prices are climbing faster than most UK and European budgets can absorb. Vendor renewals that used to be predictable are now eye-watering. Consultancy rates have shot up. And it's not just about inflation or rising costs.

Why the UK Thinks Differently About Cybersecurity Compliance

A multinational financial institution walks into its annual PCI DSS review confident it has “checked the boxes.” Firewalls are segmented, logs are retained, access controls are documented, and the audit report is clean. Months later, the same organization is reprimanded by the UK Information Commissioner’s Office (ICO). The controls were properly implemented.

Introducing Forward AI

As enterprises move toward agentic operations, speed without data accuracy becomes a liability. At Forward Networks, we recognized this challenge and set out to deliver a solution: speed backed by mathematical accuracy. In networking, acting on incomplete or approximate data is not an inconvenience, it is a cause of outages, security exposure, and operational risk.