Blog

28.01.2026 | Maya Schirmann
5 Min Read

Why Everyone Is Nostalgic for 2016, And What It Reveals About Modern Cybersecurity

Why Everyone Is Nostalgic for 2016, And What It Reveals About Modern Cybersecurity Scroll through TikTok or Instagram today and you’ll quickly notice a familiar pattern: throwback photos from 2016, vintage filters, and references to “the good old days.” What makes this trend noteworthy isn’t the aesthetics. It’s the tone. This isn’t ironic nostalgia or […]

22.01.2026 | Ariel Zamir
4 Min Read

Who Touched What, And Why Permissions Aren’t Enough

Who Touched What, And Why Permissions Aren’t Enough When something goes wrong, whether it’s a suspected breach, a regulatory inquiry, or an internal anomaly, organizations face a deceptively simple question: Who accessed the data? Not who could have accessed it. But who actually did. For many security teams, this is the moment when confidence begins […]

07.01.2026 | Ariel Zamir
5 Min Read

The Data Access Gap Putting Financial Institutions at Risk

The Data Access Gap Putting Financial Institutions at Risk Data access almost always grows faster than it shrinks. This is even more true for financial institutions as it is a tangible risk on both the security and the compliance side. New permissions are granted as people change roles, support projects, or onboard new systems. But […]

01.01.2026 | Maya Schirmann
5 Min Read

2026 Security Resolutions: Fewer Assumptions, More Evidence

2026 Security Resolutions: Fewer Assumptions, More Evidence Security failures rarely come from missing controls. They come from assumptions that hardened into policy and stopped being questioned. Risk emerges from access and data decisions made over time, through role changes, project work, access sharing, temporary exceptions, and system evolution, that quietly persist long after their original […]

24.12.2025 | Ariel Zamir
6 Min Read

Five Metrics to Reduce Financial Data Risk 

Five Metrics to Reduce Financial Data Risk  Financial institutions run comprehensive security programs, regular audits, access reviews, and controls testing. Yet when board members or regulators ask whether data risk is moving in the right direction, the answer often requires more explanation than it should. The issue isn’t missing controls. It’s that most reporting focuses […]

06.11.2025 | Ariel Zamir
5 Min Read

AI Security Needs a Reality Check

AI Security Needs a Reality Check AI has already changed how people work. Staff can ask a tool to draft notes, check data, review documents, or answer questions they cannot solve on their own. It has made work faster and more flexible. But it also introduced a risk many organizations still overlook. AI can quietly […]

19.10.2025 | Eric Wolf
5 Min Read

Insider Threats and MFA Fatigue: What the BBC Ransomware Attempt Reveals

What the BBC Ransomware Attempt Reveals It started with a message that looked more like a bribe than a breach. In September 2025, BBC cyber correspondent Joe Tidy became the target of every CISO’s nightmare: a sophisticated insider recruitment attempt by the Medusa ransomware gang. What began as an encrypted message on Signal quickly escalated […]

Ready to See Ray Security in Action?