Default Configurations, Dangerous Defaults, and ServiceNow's AI Agent Discovery
New research highlights the gap between how technology is designed to work and how it's actually safely operated.
New research highlights the gap between how technology is designed to work and how it's actually safely operated.
Anthropic's disclosure lacked important elements, which explains the professional criticism that erupted despite the potmortem's potential significance. And while the post is marketing for Anthropic, it also provides strategic threat context for security executives.
Security challenges aren’t usually about tools—they’re about people, alignment, and the unseen friction that builds when roles, workflows, and reality drift apart.
AI-driven attacks are real, and they’re occurring. But to paraphrase cyberpunk writing pioneer William Gibson, “The future is already here – it's just not evenly distributed."
Connected devices are changing how we work—but they’re also opening invisible gateways for attackers. In this article, Phillip Wylie breaks down how IoT vulnerabilities are being exploited and what organizations can do to close these unseen entry points.
2026 will bring CISOs and security professionals potential AI breaches, tight infrastructure regulation, a new European Union vulnerability database, quantum security growth, and merger and acquisition shifts.
Doing less can deliver more. Scope reduction reduces risk, simplifies compliance, and makes regulated opportunities attainable for any organization willing to focus on what really matters.