News
Why DLP, DSPM and AI Security Must Converge
19+ hour, 49+ min ago (258+ words) Data Security , Events , RSAC Conference It's estimated that only 20% of organizations have the data security maturity for safe artificial intelligence adoption, according to new CISO research from MIND. As agentic AI drives data across enterprise environments at machine speed, the…...
Simplify Security, Strengthen Recovery
1+ day, 22+ hour ago (208+ words) Cloud Security , Security Operations Leaders must maximize existing infrastructure as ransomware and AI-driven threats raise costs and risk, said Paul Lembo, field CTO at VMware by Broadcom. See Also: AI Pushes Cyberattacks to New Speed Levels "You need automation to…...
28 Million AI-Driven Cyberattacks Expected This Year—Are Security Leaders Prepared?
1+ day, 22+ hour ago (726+ words) 28 Million AI-Driven Cyberattacks Expected This Year'Are Security Leaders Prepared?govinfosecurity.com - ISMG at RSAC 2026: Exclusive interviews with Zscaler CEO Jay Chaudhry, Google DPO Kristie Chon Flynn, and more" - Why Racing to Adopt AI Puts Enterprise Security at Risk" 28 Million AI-Driven…...
Fixing SAST: How AI Is Reducing Noise and Improving AppSec Outcomes
2+ day, 1+ hour ago (169+ words) Application Security , Application Security & Online Fraud , Fraud Management & Cybercrime Static application security testing (SAST) has long been a foundation of AppSec programs'but persistent issues with false positives, limited accuracy, and developer friction have reduced its effectiveness. AI is starting to…...
Why AI Security Hinges on Context and Control
2+ day, 3+ hour ago (256+ words) Artificial Intelligence & Machine Learning , Events , Next-Generation Technologies & Secure Development The surge in artificial intelligence agents and applications has created a perfect storm for enterprise security teams - one where the technology is non-deterministic, the blast radius is enormous, and the pressure…...
Backdooring of JavaScript Library Axios Tied to North Korea
2+ day, 5+ hour ago (993+ words) 3rd Party Risk Management , Application Security , Cyberwarfare / Nation-State Attacks A supply-chain attack that compromised versions of Axios to distribute a remote access Trojan bears North Korean fingerprints, said security researchers. See Also: OnDemand | Transform API Security with Unmatched Discovery and Defense…...
The Open Back Door: Industrial Remote Access
2+ day, 22+ hour ago (798+ words) Industrial operations have never been more connected - or more exposed. As plants modernize and depend on third-party vendors, integrators and remote experts, access practices haven't kept pace with the threat landscape. See Also: AI Impersonation Is the New Arms Race'Is…...
Agentic AI Uncertainty Dominates Dialog at RSAC Conference
2+ day, 23+ hour ago (543+ words) Agentic AI , AI-Based Attacks , Cybercrime Reflecting the current state of cybersecurity, uncertainty dominated at this year's annual RSAC Conference in San Francisco. See Also: AI Impersonation Is the New Arms Race'Is Your Workforce Ready? The theme of this year's event…...
National Cyber Resilience Demands Unified Defense
3+ day, 14+ hour ago (183+ words) Cybercrime , Events , Fraud Management & Cybercrime Cyber risk is accelerating as digital reliance expands and threat actors change their tactics. Cyber leaders need to treat cybersecurity as a mission-critical part of the business, strengthen their resilience, and align defense efforts to…...
The Five Most Dangerous New Attack Techniques
3+ day, 15+ hour ago (268+ words) Artificial Intelligence & Machine Learning , Events , Next-Generation Technologies & Secure Development Organizations are "completely unprepared for 100 critical vulnerabilities in a week," said Ed Skoudis, president of the SANS Technology Institute, pointing to a near-term scenario where artificial intelligence dramatically increases the discovery…...