Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The costs of unmanaged credential sprawl

In Ancient Rome, the military had a daily “watchword” that soldiers used to enter the camp. An official would inscribe the watchword on clay tablets, which were distributed throughout the various military units. If a tablet wasn’t returned, they swiftly tracked it down and punished the soldier who had failed to return it.

1Password shows 370% YoY growth in Okta research report

1Password has never been more popular in the workplace. Okta’s 2026 “Businesses at Work” report reveals that, of the 8,000+ apps that Okta analyzed, “The security tool 1Password showed the highest industry-level growth, notching a 370% YoY increase in the technology sector.”

The State of Identity Security 2026: Identity is the new perimeter

The State of Identity Security 2026: Identity is the new perimeter Discover the causes and consequences of identity threats based on a survey of 5,000 organizations across 17 countries. In the modern cybersecurity landscape, the traditional network perimeter has dissolved. Today, identity as a perimeter keeps getting stronger and stronger. As organizations accelerate cloud adoption and integrate AI systems, the number of digital identities, both human and non-human, has grown exponentially.

Sophos Endpoint in action: Blocking a novel supply chain attack

Sophos Endpoint in action: Blocking a novel supply chain attack How the unique anti-exploitation capabilities included with Sophos Endpoint blocked a supply chain attack. Sophos Endpoint is architected from the ground up to automatically block exploits, ransomware, and attacker techniques by default with zero manual tuning.

Attackers Aren't Hacking In Anymore, They're Logging In

For years, cybersecurity strategy has been built around a simple idea: keep attackers out. Stronger perimeters. Better firewalls. More advanced endpoint protection. Smarter email filtering. But the latest insights from the Microsoft Digital Defense Report tell a very different story. Attackers aren’t breaking in. They’re logging in.

Turning Visibility Into Action: Introducing Aurora Exposure Management

Today, we’re introducing Aurora Exposure Management, a new product family at Arctic Wolf built to help organizations take a more complete and continuous approach to reducing cyber risk. The first two offerings are Aurora Vulnerability Management and Aurora Attack Surface Management. They are designed to work powerfully together, but they can also deliver meaningful value independently, depending on an organization’s priorities, existing architecture, and current stage of security maturity.

Aurora Mobile Threat Defense is Now Available

Mobile devices are becoming the highest‑trusted endpoints that are the least protected. Phones sit between your people and your most important systems: identity, email, collaboration, and cloud apps. They’re also where modern social engineers are turning their attention, leveraging SMS and messaging services, QR codes, and email-based attack vectors to harvest credentials.

RPO in Disaster Recovery: What It Means and Why It Matters

Your database crashes at 2 PM, but your last backup ran at midnight. That’s 14 hours of lost transactions, customer records, and operational data. The gap between your last usable backup and the moment disaster strikes is exactly what the recovery point objective (RPO) defines. Most organizations don’t think seriously about it until they’re already staring at the damage. RPO in disaster recovery planning determines whether you lose five minutes of data or five days of it.

AI Coding Tools Are Creating a Security Gap We Must Close Immediately

Developers love AI coding tools. And why wouldn’t they? After all, they write code faster. They reduce repetitive work. They help junior engineers ship features that used to take days. But there’s a problem no one wants to talk about at the planning meeting. AI coding tools are producing insecure code at massive scale. And the industry is running out of time to fix it.