All Intelligence

Policy

Security policy changes, regulatory updates, and compliance-relevant developments.

36 items

criticalPolicyActive

Non-human Identity Sprawl: The Unmonitored Credential Crisis Behind 68% of Cloud Breaches

Unmanaged service accounts, API keys, and orphaned credentials represent the largest attack surface in cloud environments, with compromised non-human identities responsible for nearly 7 in 10 cloud breaches in 2024. Organisations typically lack visibility into 40-50 automated credentials per employee that persist after project termination or staff departure.

Enterprise cloud deployments across AWS, Azure, GCP
informationalPolicyActive

AI pricing escalation: OpenAI's $100 Pro tier signals intensifying LLM market consolidation and potential security implications for enterprise adoption

OpenAI has launched a $100 monthly Pro subscription tier matching Anthropic's Claude pricing, reflecting competitive pressure in the generative AI market. This pricing escalation may influence how organisations evaluate AI tool security postures and dependency risks.

OpenAI, Anthropic, Enterprise organisations adopting generative AI
highPolicyActive

Google's 2029 PQC Migration Deadline: Crypto-Agility Crisis Looming for Enterprise Infrastructure

Google has committed to migrating its infrastructure to post-quantum cryptography by 2029, signalling that the cryptographically-relevant quantum computer threat window is closing faster than many organisations anticipated. This accelerates industry pressure to inventory and remediate legacy systems before quantum capabilities render current encryption obsolete.

Google, Enterprise organisations dependent on Google Cloud, Organisations using TLS/PKI infrastructure
criticalPolicyActive

Microsoft Exchange Online servicewide outage reveals continued reliability concerns in critical communication infrastructure

Microsoft Exchange Online experienced a widespread outage blocking mailbox and calendar access for customers globally. This incident underscores the operational risks of cloud-based email dependencies and the cascading business impact when a single provider experiences infrastructure failures.

Microsoft Exchange Online, Microsoft 365 subscribers
informationalPolicyEmerging

Android 17 Accessibility API Restrictions: Proactive Defense Against Malware Abuse of System Privileges

Google is implementing API restrictions in Android 17 to prevent non-accessibility apps from abusing the accessibility services API, a common malware technique for achieving privileged operations without proper permissions. This is a preventive security hardening measure rather than a response to active exploitation.

Android 17, Android Advanced Protection Mode (AAPM)