Tag: technology
-
EFF calls out major tech companies on encryption promises
The Electronic Frontier Foundation (EFF) has introduced a new campaign called Encrypt It Already, focused on expanding the use of end-to-end encryption in consumer technology … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/30/electronic-frontier-foundation-encrypt-it-already/
-
Roughly half of employees are using unsanctioned AI tools, and enterprise leaders are major culprits
51% have connected AI tools to work systems or apps without the approval or knowledge of IT;63% believe it’s acceptable to use AI when there is no corporate-approved option or IT oversight;60% say speed is worth the security risk;21% think employers will simply “turn a blind eye” as long as they’re getting their work done.And…
-
How does Agentic AI foster innovation in tech
What is Agentic AI, and How Is It Changing the Landscape of Technology? Where technology evolves at warp speed, how do organizations ensure they stay ahead of the curve? One approach gaining traction is leveraging Agentic AI to drive innovation across various sectors. Agentic AI, a term often associated with autonomous decision-making systems, is paving……
-
NDSS 2025 Reinforcement Unlearning
Session 10D: Machine Unlearning Authors, Creators & Presenters: Dayong Ye (University of Technology Sydney), Tianqing Zhu (City University of Macau), Congcong Zhu (City University of Macau), Derui Wang (CSIRO’s Data61), Kun Gao (University of Technology Sydney), Zewei Shi (CSIRO’s Data61), Sheng Shen (Torrens University Australia), Wanlei Zhou (City University of Macau), Minhui Xue (CSIRO’s Data61)…
-
Metropolitan Police needs effective constraints on live facial recognition use, court hears
Tags: technologyThe Metropolitan Police has defended its use of live facial recognition against a legal challenge that claims there are no effective constraints on where it can deploy the technology First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637860/Metropolitan-Police-needs-effective-constraints-on-live-facial-recognition-use-court-hears
-
Simplifying K-12 Technology: How ManagedMethods Can Reduce Complexity To Do More With Less
Simplifying K-12 Technology: How ManagedMethods Can Reduce Complexity To Do More With Less As K-12 districts plan for the 2026/27 school year, the pressure is mounting. Budgets are tight, staffing is stretched thin, and the number of digital tools schools rely on continues to grow. What started as efforts to solve specific problems”, student safety,…
-
Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps
A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks of substations, power plants, and control centers worldwide. Drawing on data from more than 100 installations, the analysis highlights recurring technical, organizational, and functional issues that leave critical energy infrastructure vulnerable to cyber threats.The findings are based on First seen…
-
Crooks are hijacking and reselling AI infrastructure: Report
Tags: access, ai, api, attack, authentication, business, cloud, communications, control, credentials, cybersecurity, data, data-breach, endpoint, exploit, firewall, group, infosec, infrastructure, intelligence, Internet, LLM, malicious, marketplace, risk, service, skills, technology, theft, threat, training, vulnerabilityexposed endpoints on default ports of common LLM inference services;unauthenticated API access without proper access controls;development/staging environments with public IP addresses;MCP servers connecting LLMs to file systems, databases and internal APIs.Common misconfigurations leveraged by these threat actors include:Ollama running on port 11434 without authentication;OpenAI-compatible APIs on port 8000 exposed to the internet;MCP servers accessible without…
-
How do autonomous agents decide in secure environments
How Safe Are Autonomous Agents in Your Cloud Environment? Have you ever considered the security risks posed by autonomous agents in your organization’s cloud environment? With technology advances, the rise of machine identities or Non-Human Identities (NHIs) has become a focal point in contemporary cybersecurity discussions. These NHIs operate much like a “tourist” with a……
-
‘AI-Powered’ Services Firm Says Hack Affects 3.1M
Reported Victim Tally in HCIactive’s Health Data Theft Incident Soars. The victim count in a 2025 hack against a Maryland-based firm that provides AI-powered administrative and technology services to healthcare practices soared to nearly 3.1 million nationwide, according to an updated breach report from Healthcare Interactive. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-powered-services-firm-says-hack-affects-31m-a-30618
-
Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
The “coordinated” cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian state-sponsored hacking crew known as ELECTRUM.Operational technology (OT) cybersecurity company Dragos, in a new intelligence brief published Tuesday, described the late December 2025 activity as the first major cyber attack targeting distributed energy First…
-
Cybercriminals and nation-state groups are exploiting a six-month old WinRAR defect
Nation-state groups are consistently exploiting the defect to target victims in military, government and technology for espionage. First seen on cyberscoop.com Jump to article: cyberscoop.com/winrar-defect-active-exploits-google-threat-intel/
-
Federal IT Buyers Told to Plan for Post-Quantum Cryptography
CISA Urges Agencies to Treat Quantum Readiness as a Standard Buying Expectation. The Cybersecurity and Infrastructure Security Agency is urging agencies to treat post-quantum cryptography as a near-term procurement expectation, signaling that information technology products should embed quantum-resistant security now to avoid rushed retrofits before federal migration deadlines. First seen on govinfosecurity.com Jump to article:…
-
Top AI Technology Cybersecurity Podcasts to Follow in 2026
From AI agents and MCP to cybersecurity threats – discover the podcasts that industry leaders rely on. After scaling a CIAM platform to 1B+ users, I’ve identified the shows delivering real value in 2026. No hype, just practical insights from practitioners building the future. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/top-ai-technology-cybersecurity-podcasts-to-follow-in-2026/
-
CISA releases technology readiness list for post-quantum cryptography
PQC standards and algorithm roadmap: The CISA advisory is aimed at aligning technologies with the nascent PQC standards now added into federal policy. NIST’s post-quantum standardization project and its Federal Information Processing Standards (FIPS) publications formed the baseline for the advisory.These include FIPS 203, which specifies the Module-lattice-Based Key Encapsulation Mechanism (ML-KEM) based on the…
-
Overcoming AI fatigue
Tags: access, ai, awareness, business, ciso, cloud, control, data, finance, governance, incident response, jobs, metric, monitoring, privacy, risk, strategy, supply-chain, technology, tool, training, zero-trustbefore it becomes fully entrenched in every corner of the business. It’s a rare opportunity, one we shouldn’t waste. A big part of the confusion comes from the word “AI” itself. We use the same label to talk about a chatbot drafting marketing copy and autonomous agents that generate and implement incident response playbooks. Technically,…
-
Landmark legal challenge against police facial recognition begins
Tags: technologyThe High Court will examine whether the Metropolitan Police is acting lawfully with its deployments of live facial recognition, in the UK’s first judicial review of how the technology is being used First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637602/Landmark-legal-challenge-against-police-facial-recognition-begins
-
4 issues holding back CISOs’ security agendas
Tags: access, ai, application-security, attack, business, ciso, cloud, compliance, control, cyber, cybersecurity, data, endpoint, framework, governance, intelligence, jobs, monitoring, network, resilience, risk, risk-assessment, risk-management, sans, service, skills, strategy, technology, threat, tool, training, vulnerability, vulnerability-management2. Inability to keep pace with AI innovation and adoption: Executives and employees alike have been rushing to adopt artificial intelligence, enticed by expectations that AI will transform workflows and save time, money, and effort.But CISOs for the most part have not kept pace with their business colleagues’ rate of AI adoption.According to a survey…
-
Can Agentic AI operate independently in high-stakes areas?
Can Independent Agentic AI Safeguard Our Critical Systems? Have you ever wondered how we can entrust critical operations to independent systems? The emergence of Agentic AI, with its capacity to operate autonomously, has sparked considerable discussion about its potential role in high-stakes environments. This intriguing technology has been deployed across various sectors, such as healthcare,……
-
What C-Suite Leaders Should Know from Davos 2026 About AI Innovation and Emerging Technology
The 56th annual meeting of the World Economic Forum in Davos, Switzerland drew global leaders from business, technology, research, and policy from January 19 to…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/01/what-c-suite-leaders-should-know-from-davos-2026-about-ai-innovation-and-emerging-technology/
-
Deepfake ‘Nudify’ Technology Is Getting Darker”, and More Dangerous
Sexual deepfakes continue to get more sophisticated, capable, easy to access, and perilous for millions of women who are abused with the technology. First seen on wired.com Jump to article: www.wired.com/story/deepfake-nudify-technology-is-getting-darker-and-more-dangerous/
-
Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns
Tags: access, authentication, backup, breach, business, china, cloud, control, corporate, credentials, data, endpoint, governance, government, group, india, infrastructure, law, mfa, microsoft, risk, service, technologyWhere most enterprises go wrong: Enterprises using BitLocker should treat the recovery keys as highly sensitive, and avoid default cloud backup unless there is a clear business requirement and the associated risks are well understood and mitigated.The safest configuration is to redirect those keys to on-premises Active Directory or a controlled enterprise key vault. Even…
-
Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns
Tags: access, authentication, backup, breach, business, china, cloud, control, corporate, credentials, data, endpoint, governance, government, group, india, infrastructure, law, mfa, microsoft, risk, service, technologyWhere most enterprises go wrong: Enterprises using BitLocker should treat the recovery keys as highly sensitive, and avoid default cloud backup unless there is a clear business requirement and the associated risks are well understood and mitigated.The safest configuration is to redirect those keys to on-premises Active Directory or a controlled enterprise key vault. Even…
-
NetSupport Manager 0-Day Vulnerabilities Enable Remote Code Execution
Two critical 0-day vulnerabilities in NetSupport Manager that, when chained, allow unauthenticated remote code execution (RCE). The vulnerabilities were discovered during routine security assessments of operational technology (OT) environments and affect version 14.10.4.0 and earlier, with fixes implemented in version 14.12.0000 released on July 29th, 2025. The two vulnerabilities tracked as CVE-2025-34164 and CVE-2025-34165 reside…
-
CISO’s predictions for 2026
Tags: access, ai, attack, authentication, automation, breach, business, ciso, cloud, control, credentials, cryptography, cyber, cyberattack, cybersecurity, data, data-breach, encryption, endpoint, extortion, finance, governance, government, healthcare, identity, infrastructure, malicious, mobile, mssp, network, password, penetration-testing, ransomware, risk, router, saas, soc, strategy, supply-chain, technology, threat, tool, vulnerability, warfareAI agents to reshape the threat landscape: But those same AI technologies are also changing the threat landscape. Toal points to a recent Anthropic report that documented the first large-scale AI-enabled cyberattack as an early warning sign. “I guarantee attackers will be more focused on using AI agents for what they want than a lot…
-
Inside Microsoft’s veterantech workforce pipeline
The technology workforce is changing, and military veterans are increasingly being recognized as one of the industry’s most valuable and dependable talent pools. In this Help … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/26/microsoft-veteran-tech-workforce/
-
How impenetrable are secrets vaults in modern cybersecurity?
What Makes Secrets Vaults Impenetrable in Modern Cybersecurity? What elevates the strength of secrets vaults in cybersecurity? With technology continues to evolve, the bedrock of secure information exchange lies in how effectively we handle Non-Human Identities (NHIs) and secrets management within our systems. Understanding the Critical Nature of Non-Human Identities NHIs play a pivotal role….…
-
A One-Page Introduction to CardSpace Technology
Explore the fundamentals of CardSpace technology, its role in the identity metasystem, and lessons for modern enterprise SSO and CIAM solutions. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/a-one-page-introduction-to-cardspace-technology/
-
Microsoft Shared BitLocker Recovery Keys with the FBI to Unlock Encrypted Laptop Data
Microsoft has confirmed that it provided BitLocker encryption recovery keys to the FBI following a valid search warrant, marking the first publicly known case of the technology giant sharing encryption keys with law enforcement. The disclosure occurred after federal investigators in Guam requested access to three encrypted laptops believed to contain evidence of fraud in…

