The Integrations We Forgot to Govern

The Integrations We Forgot to Govern

What happened Most organizations get hacked the same way people trip at home: not because of something dramatic, but because they overlook something small. I’ve done it myself. A few…


Most popular

Custom GPT model for Personal Brand Growth

Your Custom GPT: Creating a Personal Brand Adviser

Welcome to the first edition of the UpLevel! Newsletter. I s…

Gartner MQ for EPP 2023

Win at Positioning in 2024: How Cybersecurity Leaders Differentiate

In the ever-evolving landscape of cybersecurity, differentia…

Product Positioning Strategy

Positioning strategy: How to drive growth in 2024

The product positioning strategy is the cornerstone of any e…


Latest articles

The First AI-Orchestrated Espionage Campaign Disclosed by Anthropic

The First AI-Orchestrated Espionage Campaign

The Line That Was Crossed Until now, AI “in attacks” mostly …

AI Agents Become the New Shadow IT

AI Agents Become the New Shadow IT

Shadow IT 2.0 Across many organizations, AI adoption has mov…

ESG Gets a New Letter - C for Cybersecurity - small

ESG Gets a New Letter: C for Cybersecurity

What Changed At the end of October, the European Securities …

Agentic AI: From AI Tools to AI Actors

Agentic AI: From AI Tools to AI Actors

What the Signal Is About Most organizations are already fami…

The F5 Breach Effect: Vendor Trust Repriced

The F5 Breach Effect: Vendor Trust Repriced

Incident Summary In mid-October, F5 confirmed that a nation-…

Sovereign by Default

Sovereign by Default

Key Takeaways Macro Outlook The regulatory tide has turned i…