The Most Dangerous AI Tool Got Breached. What is an Adequate Disclosure Strategy?

Anthropic's handling of the Mythos breach is a useful case study of where disclosure practices for security breaches still need to catch up.

Row of humanoid robots working at computers, illustrating automated AI-generated code development and the security risks of vibe-coded applications

Security Gaps in Vibe-Coded Applications

An evaluation of AI-generated code security found that while detailed security prompts lead to improved outcomes, consistent vulnerabilities and gaps remain even with strict guidance.

Cyber Security Model v4: How MOD Suppliers Can Prepare for Stricter Cyber Rules

Learn how MOD suppliers can prepare for CSMv4 with support from a DCC Level 1 certified company.

Red cartoon crab mascot with glowing green eyes representing OpenClaw (formerly Moltbot), a viral AI agent with serious security risks

OpenClaw: Viral AI Sidekick That Puts You and Your Data at Risk

OpenClaw showcases how powerful “local-first” AI agents can be, but it also shows how quickly convenience can turn into a security liability.

Abstract blue geometric forms towering over a lone figure, illustrating the complexity of EU Cyber Resilience Act compliance for digital product teams

Cyber Resilience Act: How to Prepare Your Digital Products for EU Compliance

The clock’s ticking: the Cyber Resilience Act brings strict security rules across your product’s lifecycle.

Cybersecurity Trends 2026 Explained: AI Threats, Compliance, and Operational Resilience

Cybersecurity in 2026 is all about AI-driven attacks, stricter global regulations, and supply chain exposure – here's how to stay ahead.

Flat-design illustration of a developer working on a laptop atop a dark cloud formation against a red-orange background, representing software supply chain security from code to cloud deployment

Securing Your Software Supply Chain: A Step-by-Step Framework

Software supply chain security is now critical to protecting not just your code, but everything your code depends on. Learn how to secure your systems.

The Cost of Cyberattack in 2025

Discover how cybercrime grew into a $10.5 trillion economy in 2025 and why resilience, not luck, is the only defense.

Cybersecurity Trends 2025: Threats, Hacks, and Counterattacks

Discover the latest cybersecurity trends for 2025. Arm yourself with the knowledge and tools to stay secure in the face of evolving threats.

Level Up Your SDLC to SSDLC for Ultimate Application Security

Discover how adopting the Secure Development Life Cycle (SSDLC) can strengthen your application's security against ever-evolving cyber threats.

Patch Me If You Can – 3 Takeaways from the CrowdStrike Crisis

Infinum's SecOps team director shares what we can learn from the incident that got 8,5 million screens worldwide singing the blues.

NIS2 and DORA, the Power Couple of EU Cybersecurity Legislation

We demystify NIS2 and DORA, the two powerful pieces of cybersecurity legislation in the EU, and explain what they mean for your business.

How Do Phishing Simulations Contribute to Enterprise Security?

Find out and strengthen your defenses by identifying weaknesses and educating your teams.