Tag: technology
-
Patch windows collapse as timeexploit accelerates
N-day exploitation: Rapid7 Labs validated its findings about a more febrile threat environment by producing both n-day and zero-day exploits using AI-assisted research, substantially reducing development time.In practice, n-day bugs, or the development of exploits against patched software, are a bigger problem than headline-grabbing zero-day vulnerabilities, adds Leeann Nicolo, incident response lead at Coalition, a technology…
-
Weak at the seams
Tags: advisory, ai, attack, automation, business, cloud, compliance, control, crowdstrike, cybersecurity, data, data-breach, endpoint, exploit, finance, firewall, framework, healthcare, infrastructure, insurance, Internet, network, resilience, risk, service, supply-chain, technology, tool, update, vulnerability, windows, zero-dayThe normal choices are the dangerous ones: Consider the stack a typical large enterprise was running in 2024: One vendor for ERP and supply chain, another for perimeter enforcement, another for networking and another for endpoint protection. Standard choices, responsibly made. Within a twelve-month window, each of those categories experienced significant disruptions, from zero-day exploits…
-
Weak at the seams
Tags: advisory, ai, attack, automation, business, cloud, compliance, control, crowdstrike, cybersecurity, data, data-breach, endpoint, exploit, finance, firewall, framework, healthcare, infrastructure, insurance, Internet, network, resilience, risk, service, supply-chain, technology, tool, update, vulnerability, windows, zero-dayThe normal choices are the dangerous ones: Consider the stack a typical large enterprise was running in 2024: One vendor for ERP and supply chain, another for perimeter enforcement, another for networking and another for endpoint protection. Standard choices, responsibly made. Within a twelve-month window, each of those categories experienced significant disruptions, from zero-day exploits…
-
MIWIC26: Funke Omolere, Senior Technology Compliance Product Owner at Adobe
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2026’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are…
-
OT Cybersec Sector Frets Anthropic Will Leave It Behind
Pure Play OT Security Firms Want A Seat At The Table. There’s growing concern in the operational technology cybersecurity community that manufacturers and operators, and their security vendors, will be left out in the cold by the latest efforts to use artificial intelligence in securing critical software. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ot-cybersec-sector-frets-anthropic-will-leave-behind-a-31374
-
Arelion employs NETSCOUT Arbor DDoS protection products
Tags: ai, attack, automation, business, cyber, cyberattack, cybersecurity, ddos, defense, detection, government, infrastructure, intelligence, Internet, mitigation, monitoring, network, risk, router, service, strategy, tactics, technology, threat“As a Tier-1 Internet carrier supporting the majority of global Internet traffic, this continued collaboration reflects our ongoing investment in best-of-breed network security solutions to protect the technology ecosystem. Our partnership combines Arelion’s global network performance and NETSCOUT’s leading Arbor DDoS attack protection solutions to provide world-class experiences for our customers.” Scott Nichols, Chief Commercial…
-
Kubernetes Strategy: When It’s a Fit and Who Should Run It
<div cla Many organizations that use containers now run at least some production workloads on Kubernetes, and it comes up in most infrastructure discussions. But not every organization actually needs it or needs to run it themselves. This Q&A explains when Kubernetes is a good fit, when it’s overkill, what skills you need, and how…
-
The tabletop exercise grows up
would do. They do not do it.Every experienced facilitator knows the moment: someone in the room challenges the premise and the facilitator asks participants to “suspend disbelief.” That phrase should give us pause. If the scenario requires suspension of disbelief, it is not building preparedness. It is building familiarity with a document.The gap between documentation…
-
Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs
Tags: attack, cyber, cybersecurity, data, data-breach, finance, hacker, infrastructure, intelligence, Internet, iran, technologyIran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence agencies warned Tuesday.”These attacks have led to diminished PLC functionality, manipulation of display data and, in some cases, operational disruption and financial First seen on thehackernews.com Jump to article: thehackernews.com/2026/04/iran-linked-hackers-disrupt-us-critical.html
-
FBI, Pentagon warn of Iran hacking groups targeting operational technology
The advisory said Iranian actors are targeting local municipal governments, water and wastewater systems and the energy sector. First seen on therecord.media Jump to article: therecord.media/fbi-pentagon-warn-iran-hacking-groups-target-ot
-
FBI: Iran-Linked Attackers Targeting Critical Infrastructure OT Devices
A cyberattack campaign linked to Iran is attempting to compromise U.S. critical infrastructure through targeting operational technology (OT) devices, according to an advisory Tuesday from the FBI and other federal agencies. First seen on crn.com Jump to article: www.crn.com/news/security/2026/fbi-iran-linked-attackers-targeting-critical-infrastructure-ot-devices
-
The Google Workspace Blind Spot Every K-12 IT Team Misses
How DeForest School District Gained Visibility into Google Workspace and Transformed Their Security Workflow with Cloud Monitor When you’re responsible for keeping an entire school district’s technology running, “good enough” tools quickly become a problem. For Shelly Broberg, Network and Systems Administrator at DeForest School District in Wisconsin, serving about 4,300 students and 650 staff,…
-
The AI-Enabled Society of the Future Must Be Breach Ready
I am now of the firm opinion that breach readiness cannot be an enterprise-only milestone; it must also be a societal goal. The die has been cast. As AI-enabled digital services become mainstream post-2026, the societal need for AI safety and the availability of its underlying and interconnected technology labyrinths will become mainstream. If we……
-
Authentication is broken: Here’s how security leaders can actually fix it
Tags: access, attack, authentication, backup, business, communications, control, credentials, cryptography, data, exploit, fido, firmware, Hardware, healthcare, identity, login, mfa, microsoft, okta, passkey, privacy, resilience, risk, soc, technology, update, windowsSector snapshots: Where it breaks (and why that matters): Healthcare. Clinicians need tap and go speed with zero tolerance for downtime. One large hospital attempted to pair advanced HID SEOS credentials, which use privacy-preserving randomized IDs, with a clinical SSO platform that expects static IDs for user recognition. This architectural mismatch forced a choice between…
-
Cybersecurity Leaders to Watch in California’s Artificial Intelligence Industry
California’s artificial intelligence industry includes security leaders working across frontier model development, enterprise AI platforms, data infrastructure, observability, and AI-native software products. The executives in this feature bring experience from high-growth startups, major technology companies, cloud-native environments, offensive security, incident response, compliance, and product security. Their backgrounds reflect how AI security leadership now spans not…The…
-
Why DDoS Mitigation Fails: 5 Gaps That Testing Reveals
Companies invest heavily in DDoS mitigation, yet outages still happen”, often at the worst possible moment. The problem is rarely the protection technology, but the unseen gaps between deployment and a real attack, where misconfigurations, false assumptions, and untested scenarios quietly accumulate. Red Button simulation data shows that 68% of identified faults are severe or…
-
West Virginia Gives CISO Greater Authority to Lead Statewide Cybersecurity Program
What happened West Virginia approved legislation that gives the state’s chief information security officer greater authority to lead and standardize cybersecurity efforts across state government. Gov. Patrick Morrisey signed the measure on Thursday. The law directs the state’s Cybersecurity Office, led by Leroy Amos within the Office of Technology, to develop statewide cybersecurity policies and…The…
-
How do NHIs drive technology innovation
How Are NHIs Revolutionizing Technology Across Industries? What are the unseen forces revolutionizing technological? Non-Human Identities (NHIs) are among the top contenders, silently working behind the scenes to safeguard digital environments. NHIs drive technology innovation by providing security professionals with powerful tools to manage machine identities and their associated secrets. This paradigm shift has become……
-
12 cyber industry trends revealed at RSAC 2026
Tags: access, ai, application-security, authentication, awareness, business, ciso, cloud, control, cyber, cybersecurity, data, deep-fake, defense, detection, edr, endpoint, firewall, gartner, governance, identity, infrastructure, insurance, metric, microsoft, monitoring, mssp, phishing, programming, risk, risk-management, service, siem, skills, soc, software, startup, technology, threat, tool, trainingLegacy security vendors have the inside track on AI, for now: As far as AI technology consumption for cybersecurity, most CISOs I spoke with were open-minded while leaning toward their existing vendors, at least in the short term. This may buy legacy security vendors a bit, but not much time.Remember what happened in the cloud…
-
What Happens When Data Centers Become Military Targets?
It’s Time for CIOs to Rethink Business Continuity Plans and Cloud Resources The targeting of commercial cloud data centers in the Middle East marks a turning point for CIOs and enterprise leaders. Geopolitics and military conflicts are definite threats to vital technology infrastructure. The question is: How well-prepared and resilient is your enterprise? First seen…
-
Medtech giant Stryker fully operational after data-wiping attack
Stryker Corporation, one of the world’s leading medical technology companies, says it’s fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the Iranian-linked Handala hacktivist group. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/medtech-giant-stryker-fully-operational-after-data-wiping-attack/
-
The Forgotten Endpoint: Security Risks of Dormant Devices
Technology Talk: That forgotten notebook holds plenty of secrets to enterprise access. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/forgotten-endpoint-security-risks-dormant-devices
-
Anthropic employee error exposes Claude Code source
Tags: access, ai, computer, control, credentials, cybercrime, data, data-breach, malicious, open-source, service, technology, tool, vulnerabilityCSO, “no sensitive customer data or credentials were involved or exposed. This was a release packaging issue caused by human error, not a security breach. We’re rolling out measures to prevent this from happening again.”But it wasn’t the first time this had happened; according to Fortune and other news sources, the same thing happened last…
-
Beyond the Spectacle RSAC 2026 and The 5 Layers of AI Security FireTail Blog
Tags: ai, attack, business, conference, control, cybersecurity, data, detection, edr, framework, LLM, strategy, technology, tool, vulnerability, vulnerability-managementMar 31, 2026 – Jeremy Snyder – If you were at RSA Conference last year, you probably remember the goats. Or the puppies. Or the miniature petting zoos. It was a year of “over-the-top” spectacle. A bit of a circus, if I’m being honest.Coming into RSAC 2026, the vibe shifted. The show floor was noticeably…
-
How we made Trail of Bits AI-native (so far)
Tags: access, ai, application-security, attack, automation, blockchain, business, ceo, chatgpt, computer, computing, conference, control, data, email, germany, government, identity, injection, jobs, macOS, marketplace, nvidia, open-source, risk, service, skills, strategy, supply-chain, technology, threat, tool, vulnerabilityThis post is adapted from a talk I gave at [un]prompted, the AI security practitioner conference. Thanks to Gadi Evron for inviting me to speak. You can watch the recorded presentation below or download the slides. Most companies hand out ChatGPT licenses and wait for the productivity numbers to move. We built a system instead.…
-
Inventors of Quantum Cryptography Win Turing Award
Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography. I am incredibly pleased to see them get this recognition. I have always thought the technology to be fantastic, even though I think it’s largely unnecessary. I wrote up my thoughts back in 2008, in an <a href+https://www.schneier.com/essays/archives/2008/10/quantum_cryptography.html”>essay titled “Quantum…

