Identity is the New Perimeter (and AI is Breaking It)
The consensus for 2026 is clear: Identity is the battlefield, but the rules of engagement have changed.
Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks, and technologies.
The consensus for 2026 is clear: Identity is the battlefield, but the rules of engagement have changed.
According to a Bloomberg report, the intrusion lasted for at least a year and has been attributed to UNC5221, a cyber espionage group with ties to China. The attackers reportedly used a malware family known as BRICKSTORM to maintain persistent access.
Hiring an external candidate can be a significant expense, with the average cost per hire in the U.S. at nearly $5,000, so the importance and value of retention during a period of economic pressure increases.
A new audit reveals DeepSeek's iOS app transmits sensitive data unencrypted, has weak encryption, and collects excessive user data, raising serious security concerns.
Direct PDF link for CSF 2.0: https://doi.org/10.6028/NIST.CSWP.29
VMware released security updates to address multiple vulnerabilities in VMware vRealize Log Insight. A remote attacker could exploit these vulnerabilities to take control of an affected system...