The Necessity of Real-Time AI Playbook Updates
Threat teams are staying on high alert because AI-powered threat campaigns are becoming more…
Strengthening Identity Proofing in the Age of AI Voice Generators
In the age of artificial intelligence, identity and trust are critical. But businesses must…
The State of Cyber Espionage in 2025—Part 2
In Part 2 of our series on Cyber Espionage, Elise Manna-Browne expands on techniques for…
The State of Cyber Espionage in 2025—Part 1
It's mid 2025 and the modern cybersecurity landscape is starting to resemble the plot of a…
What is FIN6? And Why Its Latest Malware Attack Is So Effective
Looking for a new job or employee has become a more perilous task thanks to the recent…
The Modern IR Runbook
Incident Response (IR) is an ever-changing realm of cybersecurity that can leave teams…
The Growing Use of AI and LLMs (Part 1)
Large Language Models (LLMs) and Machine Learning (ML) have emerged as powerful tools…
The Growing Use of AI and LLMs (Part 2)
In this next part of this conversation on large language model (LLM), AI, and Machine…
OpenAI Case Study On Disrupting Malicious Use Of AI
OpenAI has released a comprehensive statement complete with case studies titled…
Concentric AI Honored with “Most Innovative Technology” Award at 2025 Innovate Cybersecurity Summit in Nashville
NASHVILLE, TENNESSEE — The 2025 Innovate Cybersecurity Summit proudly named Concentric AI…
AI-Written Malware – An Emerging Cybersecurity Threat
The new dawn of AI-assisted coding has yielded a major advantage for cyberattackers. The…
The Dangerous Divide: Silos Between Security and IT Operations
The gap between security teams and IT operations has been a persistent issue in enterprises,…