Insights Our Voice The Growing Threat of Insider Risks: Why Controls Are Essential to Mitigate Corporate Espionage in the Age of AI 20 March 2025 / 2 December 2025 by fluroltd In recent news, a high-stakes legal battle has unfolded between two technology giants—Rippling and Deel. Rippling has accused Deel of orchestrating corporate espionage by planting a mole within their organisation, accessing confidential customer data, and spying on internal systems. The case underscores a growing issue many organisations face: insider risks. Whether intentional or accidental, insider […] Read more »
Insights Our Voice A Guide to Distributed Denial of Service (DDoS) Attacks 19 March 2025 / 20 March 2026 by fluroltd DDoS attacks are becoming more sophisticated, disrupting online services with massive traffic surges that cause downtime, financial losses, and reputational damage. According to research from Microsoft, 1.25 million DDoS attacks were mitigated in just six months – a fourfold increase compared to the previous year. With attackers shifting towards stealthier application-layer and loop attacks, traditional […] Read more »
Insights Our Voice The Complete Guide to Account Takeovers (ATOs) 19 March 2025 / 2 December 2025 by fluroltd Account takeovers (ATOs) have long been a concern in the business-to-consumer space, with cybercriminals targeting vulnerable individuals to exploit personal accounts, steal identities, and abuse payment credentials. As consumers become more aware of these risks and strengthen their defences, attackers are shifting their focus to a more lucrative target, business-to-business (B2B) accounts. Unlike personal account […] Read more »
Insights Our Voice Identity Security and the Rise of Social Engineering 18 March 2025 / 2 December 2025 by fluroltd Identity Security: Why It’s More Critical Than Ever Identity attacks pose a significant threat to an organisation’s sensitive data often serving as the gateway to large-scale security breaches. In today’s digital landscape, where employees, contractors, and third-party vendors access corporate networks from various locations and devices, the attack surface continues to expand. According to Microsoft, 7,000 […] Read more »
Insights Our Voice A Guide to the Responsible Adoption of AI: Building a Secure Foundation with ISO 17 March 2025 / 20 March 2026 by fluroltd AI is transforming the world of work, but without the right safeguards, its risks can be just as disruptive as its potential. ISO provides a foundation for secure and responsible AI adoption, helping organisations manage risks, align with regulations, and ensure the reliability and integrity of AI-driven systems. In this blog, we explore the crucial […] Read more »