News
What I Learned from Scanning Dozens of Small Government Websites (and Why the Sa...
I built an open-source scanner and pointed it at small U.S. government websites. The same five security mistakes kept showing up:...
INE Highlights Enterprise Shift Toward Hands-On Training Amid Widening Skills Ga...
INE supports organizations reallocating Q4 budgets to experiential, performance-driven upskilling. 90% of organizations facing cri...
Is Shadow AI Worse Than Shadow IT?
An extension of shadow IT, shadow AI involves employees using non-approved AI technology. Security teams can reduce shadow AI expo...
Authorization in the Age of AI Agents: Beyond All-or-Nothing Access Control
Authorization is the process of determining *what* you’re allowed to do. It’s the invisible security perimeter around every digita...
The 'Sudo' Problem: Why Google is Locking Down AI Agents Before They Break the W...
Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities.
INE Earns G2 Winter 2026 Badges Across Global Markets
INE has been recognized with seven G2 Winter 2026 badges. Awards include Leader status in the Online Course Providers Grid Report,...
The Invisible Breach: How AI Is Quietly Creating New Security Blind Spots in Mod...
We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover those same systems...
SpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Th...
SpyCloud releases new data showing a sharp rise in phishing attacks that disproportionately target corporate users. Nearly 40% of...
Taking Control Of Software Supply Chains in the Open Source Era
Understanding how these recent npm attacks unfolded will help signal a way forward for a more secure software supply chain.
The Year AI Turned on Its Makers: Bioweapons, Deepfakes, and the Security Gap No...
Explore the dark side of AI: AI threats demand smarter defenses now.
Cyber Startup Frenetik Launches With Patented Deception Technology Betting Again...
Frenetik, a Maryland-based cybersecurity startup, just emerged from stealth with a new approach. Instead of flooding defenders wit...
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identi...
The 2025 State of AI Data Security Report reveals a widening contradiction in enterprise security. Eighty-three percent of organiz...
