News
Securing AI Agents in the Zero Trust Era
2+ day, 11+ hour ago (317+ words) Events , RSAC Conference , RSAC Conference Videos AI agents demand a new identity model, as they combine machine speed with human-like access, said Matt Caulfield, vice president of identity and Duo Security at Cisco. See Also: Why Racing to Adopt AI…...
Why Post-Quantum Cryptography Can't Wait Until 2030
3+ week, 1+ day ago (254+ words) Encryption & Key Management , Events , Gartner Summit Most enterprises treat digital trust as a compliance obligation rather than a business strategy, and that posture is becoming increasingly risky. Many organizations are waiting for complete asset discovery, but that approach wastes the…...
Why Govern-Later AI Policies Will Fail
3+ week, 19+ hour ago (219+ words) Artificial Intelligence & Machine Learning , Events , Gartner Summit Artificial intelligence-agent adoption has raised the stakes for identity teams because deployment can outpace governance and leave organizations with unmanaged risk. Companies should treat governance as a launch requirement, not a cleanup project…...
Data Diodes Have Become Essential to Modern OT Cybersecurity
3+ week, 3+ day ago (1302+ words) Governance & Risk Management , Operational Technology (OT) In an enterprise security landscape dominated by firewalls, antivirus software, intrusion detection systems and relentless artificial intelligence hype, the quiet efficacy of data diodes has left them largely absent from mainstream discussion. See Also:…...
Live Webinar | The 4 Biggest Cyber Threat Trends Security Leaders Must Watch
2+ week, 20+ hour ago (141+ words) Legacy detection and response are no longer enough. As revealed in the 2026 Unit 42 Global Incident Response Report, threat actors are now leveraging AI to accelerate the attack lifecycle, leaving traditional SOCs hampered by disconnected tools and manual workflows struggling to…...
Trump's Cyber Strategy Puts Private Sector on the Offensive
2+ week, 6+ day ago (892+ words) Cybercrime , Fraud Management & Cybercrime , Government The Trump administration's new national cybersecurity strategy calls for a stronger partnership between the federal government and private companies, heralding a shift in the ways private enterprise could participate in offensive operations against nation-state adversaries,…...
Fig Security Raises $30M to Modernize SOC Infrastructure
4+ week, 1+ day ago (491+ words) Security Operations , Security Operations Center (SOC) A startup run by a former Google security architect leader raised $30 million to provide observability across the entire security operations infrastructure. See Also: OnDemand | Getting started with OpenTelemetry: Planning and tips for observability teams…...
Why AI Phishing Demands Stronger MFA Now
2+ week, 2+ day ago (113+ words) Events , Gartner Summit , Video See Also: AI Scaling Requires Data Governance Framework Integration "There's no more remembering passwords or even username for some cases," said McConachie, regional director for U.K. and Ireland at Yubico. In this video interview with Information Security…...
Malicious Repo Files Could Hijack Claude Code Sessions
1+ mon, 5+ day ago (42+ words) Check Point research found three critical flaws in Anthropic's Claude Code that allow attackers to execute arbitrary commands and steal API keys through repository ... Join the ISMG Community Thank you for registering with ISMG Complete your profile and stay up…...
Anthropic's AI Bug Hunter Jolts Cyber Stocks
1+ mon, 1+ week ago (42+ words) Anthropic launched Claude Code Security, an AI tool that found 500+ undetected bugs in production code. Cybersecurity stocks dropped sharply, but analysts are split ... Join the ISMG Community Thank you for registering with ISMG Complete your profile and stay up to…...