#iot-and-cloud-security

[ follow ]
Information security
fromHarvard Gazette
2 hours ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
Artificial intelligence
fromTechRepublic
8 hours ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
#privacy
Privacy technologies
fromComputerWeekly.com
7 hours ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Software development
fromTechzine Global
1 day ago

Scale sets edge platform's software ever more free from hardware constraints

Scale Computing is reducing hardware requirements for its software, allowing more flexibility for partners and customers in choosing hardware platforms.
DevOps
fromInfoWorld
13 hours ago

When cloud giants neglect resilience

Cloud outages highlight reliability issues as providers prioritize cost-cutting over service stability, raising questions about acceptable levels of unreliability.
Tech industry
fromTheregister
16 hours ago

IOWN targets datacenter interconnects to spread AI infra

IOWN Global Forum focuses on datacenter interconnect use cases to enhance AI infrastructure connectivity and reduce costs for users.
#data-centers
Data science
fromTechzine Global
18 hours ago

Eaton: AI data centers need aerospace-grade engineering

AI demands require a complete overhaul of data center infrastructure, moving from traditional cooling methods to advanced systems-level designs.
Environment
fromAxios
13 hours ago

The best and worst states for AI data centers

Texas is attracting data center investments with tax incentives, while Maine is implementing a moratorium to evaluate the impact of data centers.
SF politics
fromwww.businessinsider.com
1 day ago

Data center executives fret over the industry's increasingly toxic public image

The data center industry faces backlash over environmental and economic concerns, threatening major projects and requiring better public relations efforts.
Data science
fromTechzine Global
18 hours ago

Eaton: AI data centers need aerospace-grade engineering

AI demands require a complete overhaul of data center infrastructure, moving from traditional cooling methods to advanced systems-level designs.
Environment
fromAxios
13 hours ago

The best and worst states for AI data centers

Texas is attracting data center investments with tax incentives, while Maine is implementing a moratorium to evaluate the impact of data centers.
SF politics
fromwww.businessinsider.com
1 day ago

Data center executives fret over the industry's increasingly toxic public image

The data center industry faces backlash over environmental and economic concerns, threatening major projects and requiring better public relations efforts.
Cryptocurrency
fromBitcoin Magazine
2 hours ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
European startups
fromTNW | Eu
12 hours ago

EU awards its 180 million sovereign cloud contract

The European Commission awarded a €180 million sovereign cloud contract to four provider groups, emphasizing diversification and resilience in cloud services.
Web frameworks
fromInfoQ
22 hours ago

Speed at Scale: Optimizing the Largest CX Platform Out There

Optimizing performance in customer experience platforms involves addressing challenges rather than focusing solely on the latest technologies.
#cybersecurity
fromTechCrunch
4 hours ago
Information security

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Careers
fromSecurityWeek
2 days ago

CISO Conversations: Ross McKerchar, CISO at Sophos

Ross McKerchar transitioned from IT to cybersecurity, becoming CISO at Sophos, emphasizing leadership skills and the growing cybersecurity profession.
Information security
fromTechCrunch
4 hours ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Information security
fromSecuritymagazine
1 day ago

What Are Security Experts Saying About OpenAI's GPT-5.4-Cyber?

OpenAI launched GPT-5.4-Cyber for cybersecurity, offering broad access to defenders while emphasizing safety and continuous improvement.
Privacy technologies
fromYahoo Tech
1 week ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
UK politics
fromTheregister
2 days ago

UK told its Big Tech habit is now a national security risk

Britain's reliance on US Big Tech poses national security risks and economic challenges due to control over critical infrastructure.
fromNature
3 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#digital-sovereignty
Europe politics
fromTheregister
4 days ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
DevOps
fromFortune
1 week ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
Europe politics
fromTheregister
4 days ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
DevOps
fromFortune
1 week ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
Artificial intelligence
fromThe Verge
2 hours ago

Anthropic's new cybersecurity model could get it back in the government's good graces

Anthropic's relationship with the Trump administration has improved due to its new cybersecurity model, Claude Mythos Preview.
Information security
fromArs Technica
11 hours ago

Recent advances push Big Tech closer to the Q-Day danger zone

Organizations are transitioning to new algorithms to replace RSA and elliptic curves due to vulnerabilities exposed by quantum computing threats.
DevOps
fromComputerWeekly.com
12 hours ago

AI, energy, and the new rules of cloud sustainability competition | Computer Weekly

Cloud providers offer sustainability metrics, but lack standardization makes it difficult for enterprises to compare workloads effectively.
EU data protection
fromComputerWeekly.com
1 day ago

CYBERUK '26: UK lagging on legal protections for cyber pros | Computer Weekly

The outdated Computer Misuse Act hinders UK cyber security innovation and needs urgent reform to protect cyber professionals.
#ai-adoption
Business intelligence
fromTechzine Global
4 days ago

AI deployment in networks is stalling as pressure on infrastructure mounts

AI adoption in network environments is slower than expected, with increasing infrastructure demands and significant challenges in deployment and integration.
Artificial intelligence
fromFortune
1 day ago

Most of you are rejecting AI. The data shows you're running out of time | Fortune

A significant majority of workers are avoiding AI tools despite expectations for AI integration in financial applications.
Business intelligence
fromNew Relic
1 day ago

The Agentic Shift: Key Takeaways from IDC Directions 2026

The focus has shifted from AI experimentation to enterprise-wide adoption, emphasizing the importance of agentic observability in the evolving agent economy.
Business intelligence
fromTechzine Global
4 days ago

AI deployment in networks is stalling as pressure on infrastructure mounts

AI adoption in network environments is slower than expected, with increasing infrastructure demands and significant challenges in deployment and integration.
Artificial intelligence
fromFortune
1 day ago

Most of you are rejecting AI. The data shows you're running out of time | Fortune

A significant majority of workers are avoiding AI tools despite expectations for AI integration in financial applications.
Tech industry
fromTheregister
1 day ago

Mozilla takes on enterprise AI providers with Thunderbolt

Mozilla launches Thunderbolt AI client as an open-source alternative to proprietary enterprise AI platforms, emphasizing data privacy and control.
#ai-governance
fromFortune
7 hours ago
Artificial intelligence

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

Artificial intelligence
fromFortune
7 hours ago

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

Yoshua Bengio emphasizes the urgent need for international cooperation in addressing AI's risks, particularly with the release of Anthropic's Mythos model.
DevOps
fromInfoQ
22 hours ago

CNCF Warns Kubernetes Alone Is Not Enough to Secure LLM Workloads

Kubernetes lacks the capability to manage the unique risks posed by large language models in AI deployments.
#identity-verification
#age-verification
EU data protection
fromWIRED
1 day ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
1 day ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
EU data protection
fromWIRED
1 day ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
1 day ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Software development
fromZDNET
2 days ago

'Like handing out the blueprint to a bank vault': Why AI led one company to abandon open source

Cal is shifting from open source to proprietary licensing due to security risks posed by modern AI tools.
DevOps
fromInfoQ
22 hours ago

AWS Launches Agent Registry in Preview to Govern AI Agent Sprawl Across Enterprises

AWS Agent Registry provides a centralized catalog for managing AI agents, tools, and skills across organizations, addressing agent sprawl and compliance issues.
Privacy technologies
fromnews.bitcoin.com
21 hours ago

Anthropic Adds ID Verification to Claude for Select AI Users

Anthropic implemented ID checks for Claude users in April 2026 to limit abuse and meet legal obligations, while not storing ID images on its systems.
Software development
fromInfoWorld
2 days ago

Mastering the dull reality of sexy AI

The gap in enterprise AI lies in building effective systems for retrieval, evaluation, memory, and governance, not just access to models.
DevOps
fromTechzine Global
4 days ago

Cloudflare introduces new features for building and deploying agents

Cloudflare is transforming AI development with Dynamic Workers, Sandboxes, and Artifacts for secure, scalable, and efficient code execution.
Information security
fromTechzine Global
7 hours ago

Broadcom brings secure AI agent environment to VMware Tanzu

Broadcom's VMware Tanzu Platform Agent Foundations provides a secure environment for autonomous AI applications with zero-trust networking and automated management.
Information security
fromComputerWeekly.com
1 day ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
DevOps
fromTechzine Global
1 week ago

Networks that brought us here won't carry us into AI future

Network infrastructure must evolve to support the demands of agentic AI, making a refresh a strategic necessity for organizations.
#malware
Information security
fromSecurityWeek
14 hours ago

ZionSiphon Malware Targets ICS in Water Facilities

ZionSiphon is a new malware targeting water treatment plants in Israel, designed to manipulate chlorine levels and pressure in these facilities.
Information security
fromSecurityWeek
2 days ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
Information security
fromSecurityWeek
14 hours ago

ZionSiphon Malware Targets ICS in Water Facilities

ZionSiphon is a new malware targeting water treatment plants in Israel, designed to manipulate chlorine levels and pressure in these facilities.
Information security
fromSecurityWeek
2 days ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
#ai
Artificial intelligence
fromFast Company
2 days ago

The idea that the internet is built for people is crumbling. That has huge implications for your business

The internet is evolving to accommodate software agents that act on behalf of users, changing how websites are designed and interacted with.
Information security
fromTechzine Global
4 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Artificial intelligence
fromFast Company
6 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromTechzine Global
2 days ago

GPT-5.4-Cyber aims to further embed AI in cybersecurity

OpenAI's GPT-5.4-Cyber enhances generative AI for cybersecurity, focusing on defensive applications and providing trusted users with advanced capabilities.
Artificial intelligence
fromFast Company
2 days ago

The idea that the internet is built for people is crumbling. That has huge implications for your business

The internet is evolving to accommodate software agents that act on behalf of users, changing how websites are designed and interacted with.
Information security
fromTechzine Global
4 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Artificial intelligence
fromFast Company
6 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromTechzine Global
2 days ago

GPT-5.4-Cyber aims to further embed AI in cybersecurity

OpenAI's GPT-5.4-Cyber enhances generative AI for cybersecurity, focusing on defensive applications and providing trusted users with advanced capabilities.
fromTheregister
10 hours ago

Microsoft closes book on rogue Windows Server 2025 upgrades

The Windows Server 2025 feature update was released as an Optional update under the Upgrade Classification: 'DeploymentAction=OptionalInstallation'. Feature update metadata must be interpreted as Optional and not Recommended by patch management tools.
Information security
fromPopular Science
6 days ago

How to stop your smart TV from tracking you

Smart TVs are capable of tracking user data, including viewing habits and app usage, which can lead to personalized advertising and content recommendations. Users may prefer to limit this tracking to protect their privacy.
Privacy technologies
fromSecurityWeek
1 day ago

Ransomware Hits Automotive Data Expert Autovista

We are responding to a ransomware incident affecting certain Autovista systems in Europe and Australia. We appreciate our customers' patience as we work to respond to this incident in a disciplined manner.
Information security
#iam
Information security
fromInfoWorld
2 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
2 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
2 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
2 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
#cisco
Information security
fromTheregister
18 hours ago

Cisco Wi-Fi boxes writing 5MB of undeletable data daily

Cisco Wi-Fi access points may fill onboard memory with nonessential data, risking software update failures due to insufficient disk space.
Information security
fromSecurityWeek
1 day ago

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco patched 15 vulnerabilities, including critical flaws in Webex and Identity Services Engine, allowing potential unauthorized access and command execution.
Information security
fromThe Hacker News
1 day ago

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Cisco has released patches for four critical security vulnerabilities in Identity Services and Webex Services that could allow unauthorized access and code execution.
Information security
fromTheregister
18 hours ago

Cisco Wi-Fi boxes writing 5MB of undeletable data daily

Cisco Wi-Fi access points may fill onboard memory with nonessential data, risking software update failures due to insufficient disk space.
Information security
fromSecurityWeek
1 day ago

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco patched 15 vulnerabilities, including critical flaws in Webex and Identity Services Engine, allowing potential unauthorized access and command execution.
Information security
fromThe Hacker News
1 day ago

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Cisco has released patches for four critical security vulnerabilities in Identity Services and Webex Services that could allow unauthorized access and code execution.
Information security
fromSecurityWeek
2 days ago

'By Design' Flaw in MCP Could Enable Widespread AI Supply Chain Attacks

MCP's architectural flaw allows adversarial takeover of user systems, exposing sensitive data and enabling malware installation.
Information security
fromSecurityWeek
2 days ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
Information security
fromArs Technica
3 days ago

UK gov's Mythos AI tests help separate cybersecurity threat from hype

Mythos outperformed previous models in TLO tests, showing capability in attacking vulnerable systems but still facing limitations in complex scenarios.
#openai
Information security
fromAxios
3 days ago

OpenAI expands access to cyber AI as hacking risks grow

OpenAI is shifting to a model that emphasizes identity verification for access to sensitive cybersecurity tools while expanding availability.
Information security
fromWIRED
3 days ago

In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model-and Strategy

OpenAI announced GPT-5.4-Cyber, emphasizing cybersecurity safeguards and the need for advanced protections in AI models.
Information security
fromAxios
3 days ago

OpenAI expands access to cyber AI as hacking risks grow

OpenAI is shifting to a model that emphasizes identity verification for access to sensitive cybersecurity tools while expanding availability.
Information security
fromWIRED
3 days ago

In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model-and Strategy

OpenAI announced GPT-5.4-Cyber, emphasizing cybersecurity safeguards and the need for advanced protections in AI models.
Information security
fromThe Hacker News
3 days ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
Information security
fromThe Hacker News
1 week ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
fromSecuritymagazine
2 weeks ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Information security
Information security
fromTechzine Global
2 months ago

Secure networking: the foundation for the AI era

Organizations must modernize and simplify networks, strengthen security, and automate to maintain resilience against increasingly sophisticated, fast-moving cyberattacks and AI-driven pressure.
Information security
fromSecurityWeek
2 months ago

Organizations Urged to Replace Discontinued Edge Devices

End-of-support edge devices create major security risks and must be identified and replaced promptly to prevent exploitation by state-sponsored threat actors.
[ Load more ]