Tag: technology
-
Signal’s Creator Is Helping Encrypt Meta AI
Moxie Marlinspike says the technology powering his encrypted AI chatbot, Confer, will be integrated into Meta AI. The move could help protect the AI conversations of millions of people. First seen on wired.com Jump to article: www.wired.com/story/signals-creator-is-helping-encrypt-meta-ai/
-
Signal’s Creator Is Helping Encrypt Meta AI
Moxie Marlinspike says the technology powering his encrypted AI chatbot, Confer, will be integrated into Meta AI. The move could help protect the AI conversations of millions of people. First seen on wired.com Jump to article: www.wired.com/story/signals-creator-is-helping-encrypt-meta-ai/
-
US lawmakers quiz Meta over ‘dangerous’ facial recognition plans for smart glasses
Democratic senators warn that Meta’s plans to introduce facial recognition technology into smart glasses could lead to normalisation of mass surveillance and breach citizens’ rights First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640518/US-lawmakers-quiz-Meta-over-dangerous-facial-recognition-plans-for-smart-glasses
-
CISA Calls on Organizations to Strengthen Microsoft Intune Security After Stryker Incident
Tags: cisa, cyber, cyberattack, cybersecurity, endpoint, infrastructure, malicious, microsoft, technologyThe Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert calling on organizations to aggressively harden their endpoint management systems. Released on March 18, 2026, the critical warning follows a significant cyberattack against U.S.-based medical technology provider Stryker Corporation. The agency observed malicious actors actively targeting endpoint management platforms, explicitly misusing legitimate administrative…
-
The True Cost of Cyber Downtime: A UK Board-Level Briefing
Tags: attack, backup, business, cloud, communications, compliance, control, cyber, cyberattack, data, finance, GDPR, governance, healthcare, infrastructure, insurance, monitoring, resilience, saas, service, supply-chain, technologyWritten by Sean Tilley, Senior Sales Director EMEA at 11:11 Systems Cyber downtime carries measurable financial consequences, and those consequences are becoming clearer with each major incident. Research from 11:11 Systems shows that 78% of European organisations report losses of up to $500,000 per hour following a cyber-related outage, while 6% face costs exceeding £1 million per…
-
CISA urges US orgs to secure Microsoft Intune systems after Stryker breach
CISA warned U.S. organizations to follow Microsoft guidance to strengthen the Intune endpoint management tool after a cyberattack exploited it to wipe medical technology giant Stryker’s systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-warns-businesses-to-secure-microsoft-intune-systems-after-stryker-breach/
-
Anthropic ban heralds new era of supply chain risk, with no clear playbook
Tags: ai, business, ceo, cisco, ciso, compliance, control, data, defense, framework, government, group, infrastructure, intelligence, law, monitoring, network, RedTeam, risk, risk-management, sbom, software, strategy, supply-chain, technology, threat, toolCompliance pressure before policy clarity: For organizations that do business with the federal government, the implications extend beyond technical challenges into legal and contractual risk. Alex Major, co-chair of government contracts and global trade practice at law firm McCarter and English, tells CSO that supply chain designations like the Anthropic ban tend to move quickly…
-
Anthropic ban heralds new era of supply chain risk, with no clear playbook
Tags: ai, business, ceo, cisco, ciso, compliance, control, data, defense, framework, government, group, infrastructure, intelligence, law, monitoring, network, RedTeam, risk, risk-management, sbom, software, strategy, supply-chain, technology, threat, toolCompliance pressure before policy clarity: For organizations that do business with the federal government, the implications extend beyond technical challenges into legal and contractual risk. Alex Major, co-chair of government contracts and global trade practice at law firm McCarter and English, tells CSO that supply chain designations like the Anthropic ban tend to move quickly…
-
Colorado Moves to Revise Its Landmark AI Law After Industry Pushback
Colorado lawmakers are preparing to revise one of the first comprehensive artificial intelligence laws in the United States, following months of tension between regulators, consumer advocates, and the technology industry. A newly released policy framework outlines how the state may adjust its 2024 AI law before enforcement begins later this year. At the center of……
-
How do NHIs drive innovation in cybersecurity
Are machine identities key to advancing cybersecurity measures? Organizations are increasingly turning to advanced technologies to bolster their defense mechanisms, especially in cloud security. One such technology gaining traction is the management of Non-Human Identities (NHIs). These machine identities are pivotal in revolutionizing cybersecurity innovation, offering a holistic approach to safeguarding sensitive data and improving……
-
US lawmakers quiz Meta over ‘dangerous’ facial-recognition plans for smart glasses
Democratic senators warn that Meta’s plans to introduce facial-recognition technology into smart glasses could lead to normalisation of mass surveillance and breach citizens’ rights First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640518/US-lawmakers-quiz-Meta-over-dangerous-facial-recognition-plans-for-smart-glasses
-
OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People’s Republic of Korea (DPRK) information technology (IT) worker scheme with an aim to defraud U.S. businesses and generate illicit revenue for the regime to fund its weapons of mass…
-
Technology accelerating crime, boosts case for national police service, says NCA chief
NCA director general Graeme Biggar says technology has helped criminals get smarter, faster and more connected, boosting case for National Police Service First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640462/Technology-accelerating-crime-boosts-case-for-national-police-service-says-NCA-chief
-
CISOs rethink their data protection strategies
Tags: access, ai, attack, automation, breach, business, cisco, ciso, cloud, compliance, computing, control, cyber, data, defense, framework, governance, healthcare, identity, jobs, LLM, privacy, resilience, risk, service, strategy, technology, tool, zero-trustFactors driving strategy evaluations CISOs, security experts, and data practitioners cite the expanding use of AI in the enterprise as the main reason they’re rethinking their data protection strategies.”AI is exposing more sensitive information as [workers] are taking that information and typing it into LLMs,” says Errol Weiss, CSO at Health-ISAC.AI tools make it easy…
-
Technology accelerating crime, boosts case for national police service says NCA chief
NCA director general Graeme Biggar says that technology had helped criminals get smarter, faster and more connected, boosting case for National Police Serivce First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640462/Technology-accelerating-crime-boosts-case-for-national-police-service-says-NCA-chief
-
Data Privacy in Technology: Finding Balance in the Age of Surveillance
Data privacy technologies help organizations protect sensitive information while balancing innovation, regulation and user trust. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/data-privacy-in-technology-finding-balance-in-the-age-of-surveillance/
-
Top IoT Security Best Practices to Prevent Cyber Attacks in 2026
The Internet of Things (IoT) continues to expand across industries, connecting smart devices, sensors, and systems that help organizations automate operations and collect real-time data. From smart manufacturing equipment to connected healthcare devices and smart buildings, IoT technology improves efficiency and productivity. However, the growing number of connected devices also increases exposure to cyber threats….…
-
Data Privacy in Technology: Finding Balance in the Age of Surveillance
Data privacy technologies help organizations protect sensitive information while balancing innovation, regulation and user trust. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/data-privacy-in-technology-finding-balance-in-the-age-of-surveillance/
-
Attack on Stryker’s Microsoft environment wiped employee devices without malware
The recent cyberattack on Stryker wiped tens of thousands of employee devices through its Microsoft environment, and systems are still offline. A recent cyberattack on medical technology giant Stryker targeted its internal Microsoft environment and remotely wiped tens of thousands of employee devices without using malware. The company confirmed that its medical devices were not…
-
Runtime: The new frontier of AI agent security
Tags: access, ai, automation, ceo, ciso, computer, container, control, crowdstrike, cybersecurity, data, detection, edr, endpoint, firewall, framework, incident response, jobs, monitoring, network, openai, risk, saas, technology, threat, tool, vulnerability, zero-dayWhat runtime monitoring looks like: Once an organization knows where its agents are, the question is what to watch for, and how.Elia Zaitsev, CTO of CrowdStrike, tells CSO that existing endpoint detection and response (EDR) tools already capture the kinds of behavior needed to track AI agents. They instrument operating systems like a flight data…
-
Stryker Targeted by Large-Scale Wiper Attack, Tens of Thousands of Devices Lost
Global medical technology giant Stryker suffered a massive cybersecurity incident on March 11, 2026, resulting in the remote wiping of thousands of corporate devices. A pro-Iranian hacktivist group known as Handala has claimed responsibility for the attack, which severely disrupted Stryker’s internal Microsoft environment, manufacturing, and shipping operations. Technical Execution Vector Unlike traditional destructive cyberattacks,…
-
Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
Tags: ai, automation, computer, corporate, cybersecurity, data, exploit, hacker, hacking, jobs, penetration-testing, skills, technology, threat, tool, update, vulnerability<div cla The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss In this episode of Simply Offensive, Philip Wylie welcomes Dan DeCloss, the founder of PlexTrac. The two veterans of the cybersecurity industry discuss their history together, the evolution of report writing, and the seismic shift AI is bringing to offensive security.…
-
Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
Tags: ai, automation, computer, corporate, cybersecurity, data, exploit, hacker, hacking, jobs, penetration-testing, skills, technology, threat, tool, update, vulnerability<div cla The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss In this episode of Simply Offensive, Philip Wylie welcomes Dan DeCloss, the founder of PlexTrac. The two veterans of the cybersecurity industry discuss their history together, the evolution of report writing, and the seismic shift AI is bringing to offensive security.…
-
How smart should your secrets rotation technology be
What Are Non-Human Identities and Why Are They Crucial? Where technology drives innovation, safeguarding our digital environments remains paramount. How do organizations ensure that their data doesn’t inadvertently become public knowledge? Non-Human Identities (NHIs) hold the key to solving this puzzle. But what exactly are NHIs, and how do they impact data security across industries?……
-
Big Tech Unites: Industry Giants Sign Global Accord to Combat AI-Driven Scams
In a rare display of unified defense, eight of the world’s most powerful technology firms have signed a landmark pact to disrupt the global scam networks currently siphoning billions of dollars from consumers. The Online Services Accord Against Scams signed by Google, Amazon.com Inc., Microsoft Corp., Meta Platforms Inc., OpenAI, LinkedIn, Adobe Inc., and Match..…
-
Beyond CVSS: OT Security Looks for Its Risk Methodology
Individual Vulnerability Severity Not Always a Good Measure of Risk Exposure. A mainstay of IT security programs across the world, the Common Vulnerability Scoring System, may have terminal flaws when applied to the mirror universe of operational technology – a place where ordinary assumptions about risk don’t apply. First seen on govinfosecurity.com Jump to article:…

