72% of European organizations are using AI in the workplace Security Staff October 24, 2024 According to a recent report, 53% of European organizations are confident employees are not properly utilizing generative AI.Read More
New macOS vulnerability allows unauthorized data access Jordyn Alger October 24, 2024 A new macOS vulnerability could allow a malicious actor to evade an operating system’s Transparency, Consent, and Control (TCC) technology. Read More
4 organizations charged with misleading cyber disclosures Security Staff October 23, 2024 The SEC has charged four public companies with misleading disclosures about cyber risks and intrusions. Read More
Middle East Escalation, Humanitarian Law and Disinformation – Episode 25 Check out episode 25 of The Cybersecurity & Geopolitical Discussion. Security Staff October 23, 2024 In episode 25 of the Cybersecurity & Geopolitical Discussion, our trio of hosts pull apart the rapidly deteriorating situation in the Middle East.Read More
CISOs respond: 49% of CISOs plan to leave role without industry action Jordyn Alger October 23, 2024 A survey shows that nearly half (49%) of CISOs do not believe there is a future for them in this role. CISOs are sharing their insights on this statistic. Read More
Iranian cyber actors are targeting critical infrastructure entities Jordyn Alger October 22, 2024 Iranian cyber actors are targeting critical infrastructure entities via brute force.Read More
Research uncovers new attack method, security leaders share insights Jordyn Alger October 22, 2024 Researchers at the University of Texas at Austin discovered a new attack method. Read More
34% of CIOs ranked securing the network as their number one priority Security Staff October 22, 2024 According to a recent report, 34% of chief information officers (CIOs) ranked securing the network as their number one priority. Read More
SolarWinds Help Desk software vulnerability added to CISA catalogue Jordyn Alger October 21, 2024 Due to evidence of active exploitation, CISA added three vulnerabilities to its Known Exploited Vulnerabilities Catalogue.Read More
A CISO’s guide to creating a cyber resilience toolkit Amar Ramakrishnan October 21, 2024 Every chief information security officer knows it isn’t a matter of “if” but “when” the systems that run their business will be disrupted in some way.Read More