#continuous-vetting

[ follow ]
#identity-management
fromThe Hacker News
49 minutes ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 day ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
49 minutes ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 day ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Software development
fromInfoWorld
3 hours ago

Microsoft's new Agent Governance Toolkit targets top OWASP risks for AI agents

Microsoft introduced the Agent Governance Toolkit to enhance AI agent security and mitigate OWASP's top 10 agentic AI threats.
Privacy professionals
fromWIRED
6 hours ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
London startup
fromTheregister
2 hours ago

DXC lands Metropolitan Police contract worth up to 1B

DXC Technology has secured a £1 billion contract to provide business process outsourcing and develop a new Oracle ERP system for the UK's Metropolitan Police Service.
#ice
US politics
fromTechCrunch
5 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromTechCrunch
5 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
DevOps
fromDevOps.com
1 day ago

Why Most DevSecOps Pipelines Fail at Runtime Security (not Build Time) - DevOps.com

Runtime risk arises from configuration and infrastructure changes post-deployment, necessitating DevSecOps to enhance security earlier in the delivery process.
#artificial-intelligence
Philosophy
fromFast Company
1 day ago

Twenty seconds to approve a military strike; 1.2 seconds to deny a health insurance claim. The human is in the AI loop. Humanity is not

Artificial intelligence significantly accelerates decision-making in military and business contexts, but human oversight may be minimal and ineffective.
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Philosophy
fromFast Company
1 day ago

Twenty seconds to approve a military strike; 1.2 seconds to deny a health insurance claim. The human is in the AI loop. Humanity is not

Artificial intelligence significantly accelerates decision-making in military and business contexts, but human oversight may be minimal and ineffective.
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#cybersecurity
Healthcare
fromSecuritymagazine
1 day ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
Information security
fromSilicon Canals
7 hours ago

Iranian hackers used Stryker's own security tools against it - and U.S. agencies say it's just the beginning - Silicon Canals

Iran-backed hackers are escalating cyberattacks against U.S. critical infrastructure, targeting water utilities and energy systems to cause operational disruption.
Information security
fromTechCrunch
4 days ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromThe Hacker News
5 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Healthcare
fromSecuritymagazine
1 day ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
Information security
fromSilicon Canals
7 hours ago

Iranian hackers used Stryker's own security tools against it - and U.S. agencies say it's just the beginning - Silicon Canals

Iran-backed hackers are escalating cyberattacks against U.S. critical infrastructure, targeting water utilities and energy systems to cause operational disruption.
Information security
fromTechCrunch
4 days ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromThe Hacker News
5 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
fromSecurityWeek
1 day ago

White House Seeks to Slash CISA Funding by $707 Million

"CISA was more focused on censorship than on protecting the Nation's critical systems, and put them at risk due to poor management and inefficiency, as well as a focus on self-promotion."
SF politics
Non-profit organizations
fromNextgov.com
1 day ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
from24/7 Wall St.
1 day ago

Palantir-Connected Ondas Clinches Yet Another High-Growth Defense Pact

Ondas announced a definitive merger agreement with Mistral, a Bethesda, Md.-based defense prime contractor, valued at $175 million, which includes $122.5 million in common stock paid upfront and in installments.
European startups
Privacy technologies
fromComputerWeekly.com
5 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
London politics
fromwww.theguardian.com
6 days ago

Overwhelmed' Prevent at risk of missing threats as referrals rise, UK counter-terror chief says

Prevent scheme faces overwhelming referrals, risking identification of genuine threats due to increased volume and lack of triage system.
Remote teams
fromTheregister
1 week ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
#fbi
Privacy professionals
fromTechRepublic
4 days ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromSecuritymagazine
2 days ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromTechRepublic
4 days ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromSecuritymagazine
2 days ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
US politics
fromArs Technica
3 days ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
EU data protection
fromFast Company
1 week ago

The most important defense regulation you've never heard of

CMMC mandates new cybersecurity standards for the defense industrial base, impacting thousands of businesses and transforming the defense supply chain.
SF politics
fromNextgov.com
1 week ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
Information security
fromThe Hacker News
1 day ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Podcast
fromSecuritymagazine
2 weeks ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
US politics
fromwww.npr.org
5 days ago

As DOJ prepares to share state voter data with DHS, a key privacy officer resigns

The DOJ is acquiring sensitive voter registration data, raising privacy concerns, as a key privacy officer resigns amid ongoing legal challenges.
#ai-governance
Artificial intelligence
fromTechCrunch
1 month ago

It's official: The Pentagon has labeled Anthropic a supply chain risk | TechCrunch

The Department of Defense designated Anthropic a supply chain risk after the company refused to allow military use of its AI for mass surveillance and autonomous weapons.
Artificial intelligence
fromwww.bbc.com
1 month ago

Anthropic labelled a supply chain risk by Pentagon

The US Pentagon designated AI firm Anthropic a supply chain risk for refusing to grant unrestricted government access to its AI tools, citing concerns about mass surveillance and autonomous weapons.
Artificial intelligence
fromTechCrunch
1 month ago

It's official: The Pentagon has labeled Anthropic a supply chain risk | TechCrunch

The Department of Defense designated Anthropic a supply chain risk after the company refused to allow military use of its AI for mass surveillance and autonomous weapons.
Artificial intelligence
fromwww.bbc.com
1 month ago

Anthropic labelled a supply chain risk by Pentagon

The US Pentagon designated AI firm Anthropic a supply chain risk for refusing to grant unrestricted government access to its AI tools, citing concerns about mass surveillance and autonomous weapons.
#ai-cybersecurity
Information security
fromSecurityWeek
20 hours ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

Information security
fromSecurityWeek
20 hours ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

fromNextgov.com
1 week ago

DHS drops investigation into former acting CISA chief's failed polygraph exam

The investigation has concluded, and this matter has been handled internally, according to a DHS spokesperson. The staff involved were placed on leave after the polygraph incident, which was necessary for access to a sensitive intelligence program.
SF politics
fromWIRED
5 days ago

CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards

The public Quizlet set contained information about alleged codes for specific facility entrances. 'Checkpoint doors code?' asked one card, with a specific four-digit combination listed in response.
Privacy professionals
World news
fromwww.theguardian.com
3 weeks ago

These aren't AI firms, they're defense contractors. We can't let them hide behind their models

AI warfare systems replicate the 'fog procedure' military strategy by automating chosen blindness through algorithmic opacity, enabling violence while obscuring accountability and decision-making responsibility.
fromSilicon Canals
1 day ago

When militaries share data centers with banks: how Gulf strikes exposed a structural flaw in global cloud infrastructure - Silicon Canals

When civilian banks, logistics platforms, and payment processors share physical data center infrastructure with military AI systems, those facilities become legitimate military targets under international humanitarian law - and the civilian services housed inside lose their legal protection.
Information security
Information security
fromThe Hacker News
1 day ago

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

Multi-OS attacks complicate SOC operations, leading to delays, fragmented evidence, and increased escalation volume, ultimately allowing attackers more time to operate.
Intellectual property law
fromEngadget
3 weeks ago

Defense Department says Anthropic poses 'unacceptable risk' to national security

The Pentagon filed a court response opposing Anthropic's lawsuit, arguing that the AI company's refusal to allow unrestricted military use poses unacceptable national security risks through potential technology manipulation or sabotage during warfighting operations.
fromDevOps.com
2 days ago

Is Your AI Agent Secure? The DevOps Case for Adversarial QA Testing - DevOps.com

The most dangerous assumption in quality engineering right now is that you can validate an autonomous testing agent the same way you validated a deterministic application. When your systems can reason, adapt, and make decisions on their own, that linear validation model collapses.
Information security
#ai-regulation
Intellectual property law
fromWIRED
3 weeks ago

Justice Department Says Anthropic Can't Be Trusted With Warfighting Systems

The Trump administration designated Anthropic a supply-chain risk, barring it from defense contracts, arguing this does not violate First Amendment rights and that the company's lawsuit will fail.
fromFast Company
1 month ago
US politics

Pentagon follows through with its threat, labels Anthropic a supply chain risk 'effective immediately'

fromTechzine Global
1 month ago
Artificial intelligence

Pentagon labels Anthropic a supply chain risk

The US Department of Defense designated Anthropic as a supply chain risk over disagreements about military use of Claude AI, particularly regarding mass surveillance and autonomous weapons restrictions.
fromThe Verge
1 month ago
Artificial intelligence

The Pentagon formally labels Anthropic a supply-chain risk

The Defense Department formally designated Anthropic a 'supply-chain risk,' barring defense contractors from using Claude AI in government work over disputes regarding autonomous weapons and mass surveillance policies.
Intellectual property law
fromWIRED
3 weeks ago

Justice Department Says Anthropic Can't Be Trusted With Warfighting Systems

The Trump administration designated Anthropic a supply-chain risk, barring it from defense contracts, arguing this does not violate First Amendment rights and that the company's lawsuit will fail.
fromFast Company
1 month ago
US politics

Pentagon follows through with its threat, labels Anthropic a supply chain risk 'effective immediately'

Artificial intelligence
fromThe Verge
1 month ago

The Pentagon formally labels Anthropic a supply-chain risk

The Defense Department formally designated Anthropic a 'supply-chain risk,' barring defense contractors from using Claude AI in government work over disputes regarding autonomous weapons and mass surveillance policies.
Intellectual property law
fromTechCrunch
2 weeks ago

DOD says Anthropic's 'red lines' make it an 'unacceptable risk to national security' | TechCrunch

The Department of Defense claims Anthropic poses an unacceptable national security risk, alleging the company might disable or alter its AI technology during military operations if its ethical guidelines are violated.
fromComputerworld
4 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Artificial intelligence
fromAxios
2 weeks ago

Pentagon: Anthropic's foreign workforce poses security risks

Anthropic's employment of foreign nationals raises national security concerns, particularly regarding compliance with China's National Intelligence Law.
Artificial intelligence
fromNextgov.com
2 weeks ago

Safe AI pathfinding is essential for government adoption, officials say

Federal agencies should adopt AI through experimentation and fit-for-purpose deployments, using centralized platforms like USAi.gov to safely evaluate tools and determine when AI solutions are actually needed.
Information security
fromSecurityWeek
5 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Artificial intelligence
fromEngadget
3 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
Information security
fromTheregister
6 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Information security
fromTheregister
5 days ago

Maude-HCS helps model and validate covert network designs

Maude-HCS, an open-source toolkit for covert communication networks, allows organizations to experiment with secure and anonymous communication systems.
#executive-protection
Information security
fromSecuritymagazine
1 week ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecuritymagazine
1 week ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecurityWeek
1 week ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromNextgov.com
1 month ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
US politics
fromNextgov.com
1 month ago

Bipartisan lawmakers worried about shaky progress on modernized government worker background check system

The National Background Investigation Services system for federal employee vetting faces a decade-long delay until fiscal 2028, costing $2.4 billion with $2.2 billion more needed, impacting national security and government contractors.
Information security
fromComputerworld
2 weeks ago

CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group

CISA urges organizations to harden endpoint management system configurations, particularly Microsoft Intune, following a pro-Iranian threat actor's compromise of Stryker's systems.
US politics
fromComputerworld
1 month ago

US DoD to Anthropic: compromise AI ethics or be banished from supply chain

Defense Secretary Pete Hegseth issued an ultimatum to Anthropic to allow unrestricted military AI use or face Pentagon exclusion and potential Defense Production Act enforcement.
Information security
fromThe Hacker News
3 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Information security
fromSecuritymagazine
3 weeks ago

Discussing Use of Force in Security: A Challenging Discussion?

Use of force in security cannot be entirely avoided but should be deployed only as a last resort when lesser options fail, requiring comprehensive training in tactics, de-escalation, and legal authority.
Information security
fromComputerWeekly.com
3 weeks ago

Vulnerability reports: Increase in quantity, decrease in quality? | Computer Weekly

Bug bounty programs face sustainability challenges due to increased low-quality submissions, prompting cURL founder Daniel Stenberg to shut down his HackerOne program and switch to GitHub for vulnerability reporting.
Information security
fromSecuritymagazine
4 weeks ago

Why Security Culture Metrics Matter More Than Dashboards

Traditional cybersecurity metrics create false confidence by masking hidden risks; culture metrics measuring employee engagement and responsiveness are essential for actual security effectiveness.
Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
fromDataBreaches.Net
1 month ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
Information security
fromSecuritymagazine
1 month ago

Why Security Teams Can No Longer Ignore Recruitment Fraud

AI-powered recruitment fraud exploits human trust in hiring workflows, with job scams surging over 1,000% as attackers use deepfakes and impersonation to target vulnerable candidates and organizations during periods of labor market volatility.
fromNextgov.com
2 months ago

Report: Workforce shortages, security fears among biggest hindrances to agency AI adoption

planning to or are already using AI.
Artificial intelligence
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
fromSecuritymagazine
1 month ago

Strategies for Security Leaders in the Midst of Skill Shortages

Organizations have reported heightened cybersecurity risks as a result of these skill shortages, but the issues don't end there. Many teams will also experience burnout, which is an issue for security teams even in the best of times, which can only add to the talent gap concern if burnt out employees leave the industry.
Information security
fromSecuritymagazine
2 months ago

What Background Checks Miss: The Human Layer Behind Modern Screening

Over the past few years, while applying for security and risk-related roles, I noticed a pattern that surprised me: many background screening vendors only asked for a few years of employment history, minimal address information, minimal educational verification, and returned results within one or two days. In contrast, I also noticed that industries with higher regulatory standards, such as finance and transportation, conduct far deeper checks that can span from weeks to months.
Information security
fromwww.theguardian.com
1 month ago

State-sponsored hackers targeting defence sector employees, Google says

The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.
Information security
fromComputerWeekly.com
2 months ago

NSA urges continuous checks to achieve zero trust | Computer Weekly

The US National Security Agency (NSA) has published its latest guidance on zero trust to secure US federal government IT networks and systems. This is the first of two guidance documents coming out of the NSA, providing "practical and actionable" recommendations that can be applied as best practice to secure corporate IT environments both in the public and private sectors.
Information security
#cve
Information security
fromBusiness Matters
1 month ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
fromSecuritymagazine
2 months ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
Information security
fromSecuritymagazine
2 months ago

Why Your Security Team Needs to Hire Non-Traditional Professionals

Hiring professionals with non-traditional backgrounds introduces fresh perspectives, challenges accepted assumptions, and can drive innovation and problem-solving in cybersecurity teams.
[ Load more ]