Recommended for you
![[object Object]](https://a.storyblok.com/f/285531722701318/2999x1999/b89753cbf2/ai_ent_04.jpg)
Securing AI in the Enterprise: Facilitating Innovation whilst Securing Adoption
This article explores the double-edged sword that is enterprise AI, the huge benefits it offers and the significant risk...
![[object Object]](https://a.storyblok.com/f/285531722701318/1599x824/6b817864df/operator_image_01.png)
The Offensive Potential of Computer-Using Agents
Computer-Using Agents (CUAs), while intended to increase productivity, can be repurposed by threat actors for malicious...
![[object Object]](https://a.storyblok.com/f/285531722701318/2312x1542/bbc3733e0c/pexels-pixabay-34225.jpg)
Scattered Spider and DragonForce: A Case Study in Human-Centric Cyber Threats
In April 2025, large retailers were targeted by cyber attacks that caused disruption across their services. Although att...