#cgic

[ follow ]
Information security
fromTechRepublic
8 hours ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
#ai-governance
fromComputerworld
1 week ago
Artificial intelligence

AI regulations are already out of date - IT leaders need to think ahead

Establishing a solid AI governance foundation now can ease future compliance with evolving AI regulations.
#ai-security
Software development
fromInfoWorld
16 hours ago

Microsoft's new Agent Governance Toolkit targets top OWASP risks for AI agents

Microsoft introduced the Agent Governance Toolkit to enhance AI agent security and mitigate OWASP's top 10 agentic AI threats.
Software development
fromThe Hacker News
2 weeks ago

How Ceros Gives Security Teams Visibility and Control in Claude Code

AI coding agents like Claude Code operate outside existing enterprise security controls, requiring new machine-level security infrastructure to provide visibility, policy enforcement, and audit trails.
Information security
fromInfoWorld
6 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
Software development
fromInfoWorld
16 hours ago

Microsoft's new Agent Governance Toolkit targets top OWASP risks for AI agents

Microsoft introduced the Agent Governance Toolkit to enhance AI agent security and mitigate OWASP's top 10 agentic AI threats.
Software development
fromThe Hacker News
2 weeks ago

How Ceros Gives Security Teams Visibility and Control in Claude Code

AI coding agents like Claude Code operate outside existing enterprise security controls, requiring new machine-level security infrastructure to provide visibility, policy enforcement, and audit trails.
Information security
fromInfoWorld
6 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
Business
fromFast Company
21 hours ago

This is the biggest risk a company can take in the age of AI

Organizations that continue transformation during uncertainty outperform those that slow down, treating turbulence as an opportunity for growth.
Privacy technologies
fromArs Technica
6 hours ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
#cybersecurity
Information security
fromSecurityWeek
39 minutes ago

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

Cyberattacks by Iranian-backed hackers will continue despite a ceasefire, targeting Israel and potentially the U.S. when deemed appropriate.
Healthcare
fromSecuritymagazine
2 days ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
EU data protection
fromSecurityWeek
4 days ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
Information security
from24/7 Wall St.
31 minutes ago

CrowdStrike CEO warns AI will trigger explosion of cyber attacks with shrinking patch windows

AI will significantly increase the speed of cyberattacks, reducing response time for organizations from days to minutes.
Information security
fromSecurityWeek
39 minutes ago

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

Cyberattacks by Iranian-backed hackers will continue despite a ceasefire, targeting Israel and potentially the U.S. when deemed appropriate.
Data science
fromTheregister
17 hours ago

UK National Data Library plan needs work, study finds

The UK's National Data Library needs improved dataset accessibility to support AI development and meaningful analysis.
Real estate
fromEntrepreneur
13 hours ago

Can You Spot Signs of Industry Disruption Before They Happen?

Most innovation occurs in three stages: visibility, interface, and incentives, impacting industry transformation.
Marketing tech
fromBusiness Matters
2 days ago

The Business of iGaming: Balancing Compliance and Growth for UK Tech Affiliates in 2026

UK gambling market faces regulatory challenges, but compliance can provide a competitive edge for small tech companies and marketing partners.
London startup
fromTheregister
15 hours ago

DXC lands Metropolitan Police contract worth up to 1B

DXC Technology has secured a £1 billion contract to provide business process outsourcing and develop a new Oracle ERP system for the UK's Metropolitan Police Service.
World news
fromTheregister
19 hours ago

Microsoft hints at bit bunkers for war zones

Microsoft is redesigning datacenters in conflict-prone regions due to Iranian attacks targeting Middle Eastern facilities linked to US military operations.
#artificial-intelligence
Business intelligence
fromComputerWeekly.com
16 hours ago

Cisco: Network readiness a determining factor for AI success | Computer Weekly

Two-thirds of industrial organizations have adopted AI in live operations, with infrastructure and security being crucial for successful transformation.
Artificial intelligence
fromEngadget
1 day ago

Anthropic launches Project Glasswing, an effort to prevent AI cyberattacks with AI

Project Glasswing aims to enhance cybersecurity against AI threats with major tech partnerships and a new AI model from Anthropic.
Business intelligence
fromComputerWeekly.com
16 hours ago

Cisco: Network readiness a determining factor for AI success | Computer Weekly

Two-thirds of industrial organizations have adopted AI in live operations, with infrastructure and security being crucial for successful transformation.
Artificial intelligence
fromEngadget
1 day ago

Anthropic launches Project Glasswing, an effort to prevent AI cyberattacks with AI

Project Glasswing aims to enhance cybersecurity against AI threats with major tech partnerships and a new AI model from Anthropic.
Non-profit organizations
fromNextgov.com
2 days ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
Canada news
fromThe Walrus
1 day ago

Why Your Credit Card Is a National Security Threat | The Walrus

Canada needs to develop its own digital payment infrastructure to ensure financial autonomy and protect against foreign control.
#cisa
SF politics
fromNextgov.com
1 day ago

Trump proposes cutting CISA election security program in FY27 budget

The Trump administration plans to cut $700 million from CISA, significantly impacting election security and infrastructure protection programs.
Information security
fromTechRepublic
1 day ago

Trump's Proposed CISA Cuts Spark Alarm Among Cybersecurity Experts

Proposed budget cuts to CISA raise concerns about U.S. cybersecurity readiness against increasing digital threats.
SF politics
fromNextgov.com
1 day ago

Trump proposes cutting CISA election security program in FY27 budget

The Trump administration plans to cut $700 million from CISA, significantly impacting election security and infrastructure protection programs.
Information security
fromTechRepublic
1 day ago

Trump's Proposed CISA Cuts Spark Alarm Among Cybersecurity Experts

Proposed budget cuts to CISA raise concerns about U.S. cybersecurity readiness against increasing digital threats.
fromTheregister
1 day ago

OpenInfra General Manager on sovereignty and kill switches

Carrez calls this 'the survival problem,' and it forms part of his definition of sovereignty - digital, data, AI, and so on. He says, 'A lot of people are just talking about digital sovereignty as like a catchphrase for a bunch of things.'
DevOps
Information security
fromSecuritymagazine
1 day ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
#ai
Privacy technologies
fromComputerWeekly.com
6 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Artificial intelligence
fromTheregister
1 day ago

Only 28% of AI infrastructure projects fully pay off

Only 28% of AI use cases in IT infrastructure succeed, with many projects failing due to unrealistic expectations and poor data quality.
Information security
fromwww.theguardian.com
8 hours ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Privacy technologies
fromComputerWeekly.com
6 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromNextgov.com
4 hours ago

Anthropic's Glasswing initiative raises questions for US cyber operations

Anthropic is prioritizing cybersecurity by withholding a powerful AI model and launching Project Glasswing to enhance defenses against AI-driven attacks.
Artificial intelligence
fromTheregister
1 day ago

Only 28% of AI infrastructure projects fully pay off

Only 28% of AI use cases in IT infrastructure succeed, with many projects failing due to unrealistic expectations and poor data quality.
Information security
fromwww.theguardian.com
8 hours ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Business
fromFortune
1 day ago

So... What Are We Doing With AI?' Innovating in an Age of Caution | Fortune

CEOs face pressure to demonstrate AI investment results while balancing short-term performance and innovation risks.
DevOps
fromDevOps.com
1 day ago

Why Most DevSecOps Pipelines Fail at Runtime Security (not Build Time) - DevOps.com

Runtime risk arises from configuration and infrastructure changes post-deployment, necessitating DevSecOps to enhance security earlier in the delivery process.
Podcast
fromSecuritymagazine
2 weeks ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
#identity-management
fromThe Hacker News
13 hours ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 day ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
13 hours ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 day ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
#data-breach
Privacy professionals
fromTechCrunch
10 hours ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromSilicon Canals
5 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromTheregister
6 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromTechCrunch
10 hours ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromSilicon Canals
5 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromTheregister
6 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
fromSilicon Canals
2 days ago

Drone strikes on Gulf data centers reveal a $5 trillion infrastructure vulnerability no one planned for - Silicon Canals

The attacks forced a reckoning with one of the most consequential design flaws in global digital infrastructure: the concentration of military and civilian data on the same physical servers, in facilities that could become military targets the moment a conflict begins.
DevOps
Information security
fromThe Hacker News
1 day ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy professionals
fromComputerworld
32 minutes ago

Questions raised about how LinkedIn uses the petabytes of data it collects

LinkedIn users should limit identifiable data exposure and treat the platform as potentially hostile until BrowserGate allegations are verified.
Information security
fromSecurityWeek
1 day ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Artificial intelligence
fromFortune
1 day ago

AI is moving fast. CFOs have a narrow window to shape its value | Fortune

CFOs have a critical opportunity to lead AI value creation by quantifying and measuring its impact on business.
#cloud-security
Information security
fromSecuritymagazine
6 days ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

World Cloud Security Day emphasizes the importance of securing cloud data, focusing on identity visibility and flexible cloud adoption for physical security.
Information security
fromInfoWorld
5 days ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
Information security
fromSecuritymagazine
6 days ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

World Cloud Security Day emphasizes the importance of securing cloud data, focusing on identity visibility and flexible cloud adoption for physical security.
Information security
fromInfoWorld
5 days ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
Artificial intelligence
fromInfoWorld
5 days ago

Google gives enterprises new controls to manage AI inference costs and reliability

Gemini API introduces Flex and Priority tiers for managing AI inference workloads based on criticality and cost.
fromSilicon Canals
1 day ago

When militaries share data centers with banks: how Gulf strikes exposed a structural flaw in global cloud infrastructure - Silicon Canals

When civilian banks, logistics platforms, and payment processors share physical data center infrastructure with military AI systems, those facilities become legitimate military targets under international humanitarian law - and the civilian services housed inside lose their legal protection.
Information security
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Information security
fromThe Hacker News
2 days ago

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

Multi-OS attacks complicate SOC operations, leading to delays, fragmented evidence, and increased escalation volume, ultimately allowing attackers more time to operate.
fromComputerworld
5 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Information security
fromSecurityWeek
5 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Information security
fromSecurityWeek
1 week ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Information security
fromComputerWeekly.com
2 weeks ago

Cyber pros must grasp the vibe coding nettle, says NCSC chief | Computer Weekly

Cyber security professionals must develop safeguards for AI-enhanced software generation to prevent vulnerabilities and cyber attacks.
Information security
fromReadWrite
2 weeks ago

The CISO Struggle: How AI is Changing the Data Security Landscape

Generative AI adoption is rapid, but security governance is lagging, creating significant risks for organizations.
Information security
fromComputerWeekly.com
3 weeks ago

Beyond integration theatre: Building stronger cyber platforms | Computer Weekly

Integration layers between security platforms, not the platforms themselves, have become the primary enterprise security risk requiring rigorous governance of delegated trust.
Information security
fromThe Hacker News
3 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
Information security
fromSecuritymagazine
1 month ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
Information security
fromEntrepreneur
2 months ago

How to Keep Your Company's Data Out of the Wrong Hands

Data security requires keeping sensitive data local, restricting access strictly, and holding vendors to higher standards to prevent breaches, leaks, and legal exposure.
[ Load more ]