Tag: defense
-
RSAC 2026 Highlights: From Agentic AI to Active Defense
How can enterprises scale cyber defenses for the coming agentic workforce? What are the top cyber trends and challenges flowing from our new normal? Let’s explore through an RSAC lens. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/rsac-2026-highlights-from-agentic-ai-to-active-defense/
-
AI Versus AI: The Future of Cyber Defense
Segura’s Joe Carson on Agentic AI, Cyber Resilience and Estonia’s Lessons. AI is accelerating both attackers and defenders, transforming cybersecurity into an AI-versus-AI battle. Segura’s Joe Carson discusses why organizations must treat agentic AI as a force multiplier, not a replacement, and how to harness it responsibly in a future driven by autonomous agents. First…
-
Identity is the first line of defense, especially in an AI-fueled threat landscape
Two new reports illustrate why companies need to do a better job of scrutinizing what their human employees and AI agents are doing. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/identity-governance-ai-cybersecurity/815964/
-
Top product launches at RSAC 2026
RSAC 2026 showcased a wave of innovation, with vendors unveiling technologies poised to redefine cybersecurity. From AI-powered defense to breakthroughs in identity … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/27/rsac-2026-top-product-launches/
-
Pentagon Piloting Skills-Based Assessments for Cyber Workers
Proponents Favor Performance Tests Over Certs. The U.S. Department of Defense is for the first time piloting new skills-based assessments for its cyber hiring as an alternative to checking paper qualifications. Many certificates, officials say, don’t reflect the skills their cyber teams need in the real world. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/pentagon-piloting-skills-based-assessments-for-cyber-workers-a-31222
-
Livestream Replay: The War Machine
Tags: defenseA panel of WIRED experts dissected the defense tech industry’s impact on modern warfare. First seen on wired.com Jump to article: www.wired.com/story/livestream-the-war-machine/
-
Speed, Judgment and Behavior: AI’s Defense Mandate
Capitol Meridian Partners’ Niloofar Razi on Innovation Sandbox, AI-Driven Offense. Cybersecurity can no longer stop at the system boundary. Organizations must understand how humans and AI agents behave, and intervene before attackers exploit that behavior, says Niloofar Razi, operating partner at Capitol Meridian Partners. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/speed-judgment-behavior-ais-defense-mandate-a-31204
-
Speed, Judgment and Behavior: AI’s Defense Mandate
Capitol Meridian Partners’ Niloofar Razi on Innovation Sandbox, AI-Driven Offense. Cybersecurity can no longer stop at the system boundary. Organizations must understand how humans and AI agents behave, and intervene before attackers exploit that behavior, says Niloofar Razi, operating partner at Capitol Meridian Partners. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/speed-judgment-behavior-ais-defense-mandate-a-31204
-
Anduril Wants to Own the Future of War Tech. Mishaps, Delays, and Challenges Abound
From drones to missiles to submarines, the $30.5 billion defense startup wants to transform how the tools of war are made. It’s not all going as planned. First seen on wired.com Jump to article: www.wired.com/story/andurils-real-war-is-with-itself/
-
Anduril Wants to Own the Future of War Tech. Mishaps, Delays, and Challenges Abound
From drones to missiles to submarines, the $30.5 billion defense startup wants to transform how the tools of war are made. It’s not all going as planned. First seen on wired.com Jump to article: www.wired.com/story/andurils-real-war-is-with-itself/
-
Anduril Wants to Own the Future of War Tech. Mishaps, Delays, and Challenges Abound
From drones to missiles to submarines, the $30.5 billion defense startup wants to transform how the tools of war are made. It’s not all going as planned. First seen on wired.com Jump to article: www.wired.com/story/andurils-real-war-is-with-itself/
-
University of North Georgia Triumphs in DOD Hacking Contest
The Mission: Hack High Value Targets’ Devices, Apps and Transmit His Location. A team of cybersecurity students from the University of North Georgia vanquished seven opposing teams from other senior military colleges and elite service academies in an upset victory to win a capture the flag hacking contest staged this week at the National Defense…
-
Anduril Wants to Own the Future of War Tech. Mishaps, Delays and Challenges Abound.
From drones to missiles to submarines, the $30.5 billion defense startup wants to transform how the tools of war are made. It’s not all going as planned. First seen on wired.com Jump to article: www.wired.com/story/andurils-real-war-is-with-itself/
-
Anduril Wants to Own the Future of War Tech. Mishaps, Delays and Challenges Abound.
From drones to missiles to submarines, the $30.5 billion defense startup wants to transform how the tools of war are made. It’s not all going as planned. First seen on wired.com Jump to article: www.wired.com/story/andurils-real-war-is-with-itself/
-
Join Our Livestream: The War Machine
Tags: defenseAt noon ET today, a panel of WIRED experts will dissect the defense tech industry’s impact on modern warfare. Submit your questions now. First seen on wired.com Jump to article: www.wired.com/story/livestream-the-war-machine/
-
Join Our Livestream Today: The War Machine
Tags: defenseAt noon ET today, a panel of WIRED experts will dissect the defense tech industry’s impact on modern warfare. Submit your questions now. First seen on wired.com Jump to article: www.wired.com/story/livestream-the-war-machine/
-
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
Most teams have security tools in place. Alerts are firing, dashboards look clean, threat intel is flowing in. On the surface, everything feels under control.But one question usually stays unanswered: Would your defenses actually stop a real attack?That’s where things get shaky. A control exists, so it’s assumed to work. A detection rule is active,…
-
Researchers uncover WebRTC skimmer bypassing traditional defenses
Researchers found a new skimmer using WebRTC to steal and send payment data, bypassing traditional security controls. Sansec researchers discovered a new payment skimmer that uses WebRTC data channels instead of typical web requests to load malicious code and exfiltrate stolen payment data. >>What sets this attack apart is the skimmer itself. Instead of the usual…
-
Anduril’s Real War Is With Itself
From drones to missiles to submarines, the $30.5 billion defense startup wants to transform how the tools of war are made. It’s not all going as planned. First seen on wired.com Jump to article: www.wired.com/story/andurils-real-war-is-with-itself/
-
AI-Based Threats Usher in ‘Dark Period’ for Cyber Defenders
NightDragon CEO Dave DeWalt on Perfect Storm of Risks, Attackers and Hybrid Warfare. Cybersecurity has entered a dark phase as AI-powered attackers outpace defense teams. Dave DeWalt of NightDragon outlines how hybrid warfare, critical infrastructure risks and rapid innovation are reshaping global security priorities. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-based-threats-usher-in-dark-period-for-cyber-defenders-a-31184
-
AI-Based Threats Usher in ‘Dark Period’ for Cyber Defenders
NightDragon CEO Dave DeWalt on Perfect Storm of Risks, Attackers and Hybrid Warfare. Cybersecurity has entered a dark phase as AI-powered attackers outpace defense teams. Dave DeWalt of NightDragon outlines how hybrid warfare, critical infrastructure risks and rapid innovation are reshaping global security priorities. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-based-threats-usher-in-dark-period-for-cyber-defenders-a-31184
-
AI-Based Threats Usher in ‘Dark Period’ for Cyber Defenders
NightDragon CEO Dave DeWalt on Perfect Storm of Risks, Attackers and Hybrid Warfare. Cybersecurity has entered a dark phase as AI-powered attackers outpace defense teams. Dave DeWalt of NightDragon outlines how hybrid warfare, critical infrastructure risks and rapid innovation are reshaping global security priorities. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-based-threats-usher-in-dark-period-for-cyber-defenders-a-31184
-
New critical Citrix NetScaler hole of similar severity to CitrixBleed2, says expert
CSO in an email, because the hole allows an unauthenticated remote attacker to leak potentially sensitive information from the appliance’s memory.”This vulnerability is one that threat actors and researchers alike are paying attention to,” he said.The vulnerability carries similar ramifications to 2023’s CitrixBleed and 2025’s CitrixBleed2 memory leak vulnerabilities, Emmons added. Then, unauthenticated attackers with…
-
How Cyberattacks Can Turn Battery Farms Into Grid Blackouts
Centrii’s Rafael Narezzi on Dangers of Weak Controls in Decentralized Energy Systems. As power systems decentralize to support AI workloads and rising energy demand, cyber defenses haven’t been keeping pace, says Rafael Narezzi of Centrii. In fact, in December 2025 in Poland, cyberattackers disrupted the power grid balance by targeting battery storage systems. First seen…
-
CISA Forced Into ‘Reactive’ Cyber Posture Amid Shutdown
Acting Director Says Furloughs And Cuts Limit Proactive Cyber Defense. A prolonged Homeland Security department shutdown has sidelined much of the U.S. cyber defense agency, halting proactive cyber operations, delaying directives and weakening visibility into threats – conditions officials warn are increasing systemic risk across critical infrastructure. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cisa-forced-into-reactive-cyber-posture-amid-shutdown-a-31189
-
RSAC Cryptographers’ Panel Highlights AI Defense Challenges
Missing: Threat Models to Defend Against Attacks in the Age of Agentic AI. AI continues to rapidly reshape the cybersecurity ecosystem in unforeseen ways, leaving for now unanswered the question about how to best defend against it, warned panelists at the 35th annual Cryptographers’ Panel at RSAC Conference. First seen on govinfosecurity.com Jump to article:…
-
Miggo Security Expands Runtime Defense Platform With AI-BOM, Agentic Detection, and MCP Monitoring
Miggo Security is significantly expanding its Runtime Defense Platform at RSA Conference 2026, adding an AI Bill of Materials, runtime guardrails, and Agentic Detection and Response capabilities. The release is aimed at organizations running AI agents, Model Context Protocol toolchains, and shadow AI in production environments where existing security controls fall short. The problem Miggo..…
-
AI Has Created a New Attack Surface and Encryption Is Not Enough
Tags: access, ai, attack, ciso, cryptography, cybersecurity, data, data-breach, defense, encryption, endpoint, exploit, framework, injection, intelligence, leak, LLM, microsoft, mitigation, network, risk, service, side-channel, sql, training, vulnerability<div cla Executive Insight For decades, enterprises relied on strong encryption to protect sensitive data in transit, and encryption used to be the end of the conversation. If an organization could say “we use TLS 1.3 and modern cipher suites,” that was enough to reassure boards, regulators, and customers that data in transit was…
-
AI Has Created a New Attack Surface and Encryption Is Not Enough
Tags: access, ai, attack, ciso, cryptography, cybersecurity, data, data-breach, defense, encryption, endpoint, exploit, framework, injection, intelligence, leak, LLM, microsoft, mitigation, network, risk, service, side-channel, sql, training, vulnerability<div cla Executive Insight For decades, enterprises relied on strong encryption to protect sensitive data in transit, and encryption used to be the end of the conversation. If an organization could say “we use TLS 1.3 and modern cipher suites,” that was enough to reassure boards, regulators, and customers that data in transit was…

