Tag: metric
-
Fairwinds Insights Release Notes: Kyverno Integration GPU Metrics
<div cla Over the last several months, we’ve expanded Fairwinds Insights to give platform and operations teams deeper visibility into both policy posture and infrastructure metrics and costs. Our releases focused on enhancing the Kyverno integration and introducing GPU”‘aware metrics and cost data to support better scheduling and rightsizing decisions. First seen on securityboulevard.com Jump…
-
A scorecard for cyber and risk culture
Tags: access, automation, awareness, breach, business, compliance, control, credentials, cyber, finance, governance, identity, jobs, metric, mitigation, phishing, risk, service, strategy, tool, trainingWhen someone asks for an exception.When a change goes in late.When an alert fires at 2 a.m.When a junior analyst spots something odd and wonders if it’s worth escalating.When an executive wants speed, and the team wants safety. Ownership means people act like the risk is partly theirs. They don’t outsource judgment to “security.” They…
-
Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities
Tags: ai, attack, cyber, data, data-breach, intelligence, metric, service, software, supply-chain, threat, vulnerabilityThe 2026 State of DevSecOps report reveals a critical tension between development velocity and security. While organizations rapidly adopt AI-assisted coding, many fail to manage dependencies properly, leaving their software supply chains highly vulnerable to threat actors.”‹ Threat Intelligence Data Threat Vector Key Metric Security Impact Deployed Services 87% of organizations have known vulnerabilities”‹. High…
-
Boards don’t need cyber metrics, they need risk signals
Tags: access, advisory, ai, attack, automation, awareness, business, ciso, control, cyber, cybersecurity, data, framework, governance, intelligence, metric, phishing, riskThe seduction of counting: Even when metrics are not too technical and align with business impact, another problem emerges: What gets counted can crowd out what matters.Wendy Nather, a longtime CISO who is now an advisor at EPSD, cautions against equating measurement with understanding. “When you are reporting to the board, there are some things…
-
From Inflated Metrics to Trusted Data: How a Premium Retail Brand Restored Analytics Integrity
Discover how a premium retail brand achieved 40% better analytics accuracy and eliminated 2,000 more daily bot sessions by switching to DataDome’s bot protection. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/from-inflated-metrics-to-trusted-data-how-a-premium-retail-brand-restored-analytics-integrity/
-
How to Strengthen App Performance Without Slowing Innovation
Tags: metricLearn how to strengthen app performance without slowing innovation using metrics, observability, scalability planning, and disciplined release strategies. First seen on hackread.com Jump to article: hackread.com/strengthen-app-performance-without-slow-innovation/
-
Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on identity posture when assessing cyber risk. For many organizations, however, these assessments remain largely opaque. Elements such as password hygiene, privileged access management, and the extent of multi-factor authentication (MFA) coverage are First seen on thehackernews.com…
-
NDSS 2025 NDSS 2025 BARBIE: Robust Backdoor Detection Based On Latent Separability
Session 12D: ML Backdoors Authors, Creators & Presenters: Hanlei Zhang (Zhejiang University), Yijie Bai (Zhejiang University), Yanjiao Chen (Zhejiang University), Zhongming Ma (Zhejiang University), Wenyuan Xu (Zhejiang University) PAPER BARBIE: Robust Backdoor Detection Based On Latent Separability Backdoor attacks are an essential risk to deep learning model sharing. Fundamentally, backdoored models are different from benign…
-
NDSS 2025 NDSS 2025 BARBIE: Robust Backdoor Detection Based On Latent Separability
Session 12D: ML Backdoors Authors, Creators & Presenters: Hanlei Zhang (Zhejiang University), Yijie Bai (Zhejiang University), Yanjiao Chen (Zhejiang University), Zhongming Ma (Zhejiang University), Wenyuan Xu (Zhejiang University) PAPER BARBIE: Robust Backdoor Detection Based On Latent Separability Backdoor attacks are an essential risk to deep learning model sharing. Fundamentally, backdoored models are different from benign…
-
Discipline is the new power move in cybersecurity leadership
Tags: automation, cyber, cybersecurity, data, group, incident response, intelligence, metric, risk, risk-management, service, siem, soc, technology, threat, tool, update, vulnerability, vulnerability-managementHow to do more with less: 1. Review contracts, renegotiate them or change the operations to a new partner Scope, service-level agreements and performance metrics should be revisited because many contracts were established under different risk profiles, urgency and pricing conditions. Modernizing contracts to focus on outcomes rather than activities, revalidating pricing and service assumptions…
-
Security Metrics That Actually Predict a Breach
Identity drift, stale access paths, alert fatigue, and risky change patterns are the security metrics most likely to predict a breach. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/security-metrics-that-actually-predict-a-breach/
-
Noodlophile Malware Authors Use Fake Job Ads and Phishing Schemes to Evolve Tactics
Hey folks in the threat”‘hunting world looks like our coverage of the Noodlophile infostealer has struck a nerve with its creators. The operators used inflated engagement metrics and fake popularity scores to lure victims into downloading malicious ZIP archives. Once executed, these payloads quietly harvested user credentials, crypto”‘wallet data, browser information, and more all exfiltrated through Telegram…
-
Finding a common language around risk
Tags: ceo, cio, ciso, corporate, cyber, cybersecurity, defense, framework, governance, guide, intelligence, lessons-learned, metric, monitoring, phishing, ransomware, risk, risk-management, service, strategy, supply-chain, technology, threat, tool, training, updateBuilding one culture from three languages: The Organizational Risk Culture Standard (ORCS) offers something most frameworks miss: it treats culture as the foundation, not the afterthought. You can’t bolt culture onto existing processes and call it done. Culture is how people actually think about risk when no one is watching. It’s the shared beliefs that…
-
From MSSP to Autonomous SOC: Replacing Linear Headcount with Infinite Compute
MSSPs optimize for SLA metrics, not security outcomes. Autonomous SOC platforms like Morpheus can replace them at 10x lower cost. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/from-mssp-to-autonomous-soc-replacing-linear-headcount-with-infinite-compute/
-
From MSSP to Autonomous SOC: Replacing Linear Headcount with Infinite Compute
MSSPs optimize for SLA metrics, not security outcomes. Autonomous SOC platforms like Morpheus can replace them at 10x lower cost. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/from-mssp-to-autonomous-soc-replacing-linear-headcount-with-infinite-compute/
-
Schrödinger’s cat and the enterprise security paradox
Tags: control, cybersecurity, detection, exploit, framework, identity, intelligence, jobs, metric, penetration-testing, RedTeam, resilience, risk, siem, strategy, threat, tooland compromised. The dashboards might be green and the audit reports reassuring, but the uncomfortable reality is that you do not know your actual state until you observe it directly and often. Many readers will have heard of Schrödinger’s cat in passing, but the details blur over time, so it is worth revisiting what the…
-
Schrödinger’s cat and the enterprise security paradox
Tags: control, cybersecurity, detection, exploit, framework, identity, intelligence, jobs, metric, penetration-testing, RedTeam, resilience, risk, siem, strategy, threat, tooland compromised. The dashboards might be green and the audit reports reassuring, but the uncomfortable reality is that you do not know your actual state until you observe it directly and often. Many readers will have heard of Schrödinger’s cat in passing, but the details blur over time, so it is worth revisiting what the…
-
NDSS 2025 Alba: The Dawn Of Scalable Bridges For Blockchains
Session 11A: Blockchain Security 2 Authors, Creators & Presenters: Giulia Scaffino (TU Wien), Lukas Aumayr (TU Wien), Mahsa Bastankhah (Princeton University), Zeta Avarikioti (TU Wien), Matteo Maffei (TU Wien) PAPER Alba: The Dawn of Scalable Bridges for Blockchains Over the past decade, cryptocurrencies have garnered attention from academia and industry alike, fostering a diverse blockchain…
-
Measuring Agentic AI Posture: A New Metric for CISOs
In cybersecurity, we live by our metrics. We measure Mean Time to Respond (MTTR), Dwell Time, and Patch Cadence. These numbers indicate to the Board how quickly we respond when issues arise. But in the era of Agentic AI, reaction speed is no longer enough. When an AI Agent or an MCP server is compromised,…
-
The Agentic AI Posture Score: A New Metric for CISOs
In cybersecurity, we live by our metrics. We measure Mean Time to Respond (MTTR), Dwell Time, and Patch Cadence. These numbers tell the Board how fast we react when things go wrong. But in the era of Agentic AI, reaction speed is no longer enough. When an AI Agent or an MCP server is compromised,…
-
NDSS 2025 On the Robustness Of LDP Protocols For Numerical Attributes Under Data Poisoning Attacks
Session 10C: Privacy Preservation Authors, Creators & Presenters: Xiaoguang Li (Xidian University, Purdue University), Zitao Li (Alibaba Group (U.S.) Inc.), Ninghui Li (Purdue University), Wenhai Sun (Purdue University, West Lafayette, USA) PAPER On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks Recent studies reveal that local differential privacy (LDP) protocols are…
-
Overcoming AI fatigue
Tags: access, ai, awareness, business, ciso, cloud, control, data, finance, governance, incident response, jobs, metric, monitoring, privacy, risk, strategy, supply-chain, technology, tool, training, zero-trustbefore it becomes fully entrenched in every corner of the business. It’s a rare opportunity, one we shouldn’t waste. A big part of the confusion comes from the word “AI” itself. We use the same label to talk about a chatbot drafting marketing copy and autonomous agents that generate and implement incident response playbooks. Technically,…
-
Rust package registry adds security tools and metrics to crates.io
The Rust project updated crates.io to include a Security tab on individual crate pages. The tab shows security advisories drawn from the RustSec database and lists which … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/21/rust-crates-io-security-update/
-
Turning cyber metrics into decisions leaders can act on
In this Help Net Security video, Bryan Sacks, Field CISO at Myriad360, explains how security leaders can measure cybersecurity in ways that matter to executives and boards. He … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/13/cybersecurity-metrics-for-executives-video/
-
Most Popular Cybersecurity Blogs From 2025
What were the top government technology and cybersecurity blog posts in 2025? The metrics tell us what cybersecurity and technology infrastructure topics were most popular. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/most-popular-cybersecurity-blogs-from-2025/
-
Beyond “Is Your SOC AI Ready?” Plan the Journey!
You read the “AI-ready SOC pillars” blog, but you still see a lot of this: Bungled AI SOC transition How do we do better? Let’s go through all 5 pillars aka readiness dimensions and see what we can actually do to make your SOC AI-ready. #1 SOC Data Foundations As I said before, this one is my…

