Security

Lookout mobile security threats Jim Dolce

AI Voice Clones and Mobile Phishing: The Cyber Threats You’re Not Ready For

Cybercriminals are evolving—and they’ve set their sights on your smartphone. For years, companies focused heavily on email phishing. Employees were trained to hover over suspicious links and think twice before clicking. But while security leaders were busy shoring up inbox […]

AI Voice Clones and Mobile Phishing: The Cyber Threats You’re Not Ready For Read More »

AI-powered cybersecurity agentic AI

The AI Arms Race: Why Traditional Cybersecurity is Already Obsolete

Having spent the last 20+ years in cybersecurity, helping scale cybersecurity companies, I’ve watched attacker methods evolve in creative ways. But Kevin Mandia’s prediction about AI-powered cyberattacks within a year isn’t just forward-looking, the data shows we’re already there. The

The AI Arms Race: Why Traditional Cybersecurity is Already Obsolete Read More »

cyber resilience

You Can’t Prevent Every Attack—Here’s How to Build Resilience Instead

Let’s face it: winning the battle against cyber incidents and intrusions is becoming elusive. Attackers are increasingly more successful and impactful, and organizations are resorting to “whack-a-mole” reactive strategies as a countermeasure. And while the velocity of attacks is increasing,

You Can’t Prevent Every Attack—Here’s How to Build Resilience Instead Read More »

Scroll to Top