The 2026 Threat Landscape: Common Tradecraft and the Gaps We Leave Open
In 2026, there’s no such thing as a "perfect" perimeter. The modern approach is an “Assume Breach” mentality, but that doesn’t mean you should leave your doors wide open.
Today’s attackers have moved away from noisy, complex exploits in favour of the path of least resistance: using your own tools and misconfigured credentials.
That’s why we’re unpacking the 2026 Huntress Cyber Threat Report to show you how to maintain elite detection while using posture management to strip away the "unforced errors" that attackers rely on. Here’s what Huntress experts, Sean Stitt and Justin Allen, will get into:
Key insights from Huntress’ 2026 Cyber Threat Report.
Local intel: Real-world incident breakdowns from Australia and New Zealand.
Closing the gaps: A breakdown of the configuration drift that bypasses even the best sensors.
Huntress ESPM & ISPM: How to harden your environment to ensure attackers have nowhere to hide.
Live Q&A
[Summary text goes here]