Latest editions

Agentic AI: From AI Tools to AI Actors

Agentic AI: From AI Tools to AI Actors

What the Signal Is About Most organizations are already fami…

The F5 Breach Effect: Vendor Trust Repriced

The F5 Breach Effect: Vendor Trust Repriced

Incident Summary In mid-October, F5 confirmed that a nation-…

Sovereign by Default

Sovereign by Default

Key Takeaways Macro Outlook The regulatory tide has turned i…

When Politics Weakens Cyber Defense

When Politics Weakens Cyber Defense

Not every cyber crisis begins with a breach. Sometimes, it s…

From Pilots to Mandates - Digital ID Becomes Infrastructure

From Pilots to Mandates – Digital ID Becomes Infrastructure

On September 25, the UK government confirmed that by 2029, e…

Capital Flows to Counter AI Agents Risks

Capital Flows to Counter AI Agents Risks

On September 16, researchers disclosed ShadowLeak, a zero-cl…

AI Identity Attacks. From Novel to Normal

AI Identity Attacks. From Novel to Normal

AI-powered identity abuse moved from novel to normal this we…

Kids’ privacy enforcement steps up.

Kids Privacy Enforcement Steps Up

Cybersecurity as a Business. Sep 1-7, 2025 Edition Children’…

2025 Cybersecurity Predictions

Cybersecurity Predictions 2025 – How to Prepare

I’ve been monitoring the cybersecurity space for more than t…