When thieves stole more than $80 million in jewels from the Louvre in Paris, they didn't exploit a total absence of security but rather gaps in the museum's broader security program, encompassing both aging systems and situational awareness, according to early reports. The museum's director later confirmed that the balcony used in the break-in wasn't covered by a functioning external camera; the only camera nearby faced the wrong direction.
"The European Union is tightening its visa rules for Russian nationals amid concern over what the bloc considers "sabotage and potential misuse of visas." Multiple-entry visas will no longer be issued, with applicants being required to apply for a new visa each time they sought to travel to the EU. In a statement released by the European Commission, they expressed the aim of the new rules were to protect public policy as well as security."
It's amazing to see how quickly web developers have adopted artificial intelligence (AI) apps. Many have added this technology to their workflow and haven't looked back. There are pros and cons to this seismic industry shift. On the bright side, AI speeds up the development process. We don't have to spend hours poring over WordPress documentation. Instead, we explain our coding needs in plain language. AI helps us build new things from scratch and troubleshoot existing code.
When Maccabi Tel Aviv were drawn to face Aston Villa in the Europa League, the fixture immediately stood out. The prospect of an Israeli team travelling to play a club based in a predominantly Muslim area prompted concerns from those in charge of ensuring the fixture passes off safely. Six weeks ago, there was even a chance the game might not go ahead, with calls for Israeli teams to be removed from international competitions because of the Israel-Gaza war.
At 9.30am, when visitors were already streaming into the museum's galleries, two masked thieves used a goods lift on a truck parked on the riverbank side of the building to reach a balcony on the first floor. Using two grinders, which they also reportedly threatened museum employees with, the thieves cut through a glazed window leading to the Apollo Gallery of decorative art, smashed two cabinets displaying 19th century royal and imperial jewellery and grabbed ten items, before escaping back down the ladder and fleeing with two accomplices on TMax scooters.
Sidero Labs has been developing Talos Linux, an immutable operating system purpose-built exclusively for running Kubernetes, alongside Omni, a cluster lifecycle management platform. InfoQ met the Sidero team in Amsterdam during the TalosCon 2025 and had conversations about their approach to simplifying Kubernetes operations through minimalism and security-first design. The concept for Talos emerged from practical frustrations with traditional operating systems in enterprise environments.
What is software? "Software" is actually quite a broad term, spanning everything from low-level firmware running on devices; operating systems; command-line tools that only developers use; compiled code that runs on its own; interpreted code that needs some other piece of software - or even an entire other application like a web browser! - to run it. Software takes many, many forms, and is created and executed in many different ways for many different purposes.
It will be the most high-security sports event in Norway since the Winter Olympics in 1994. Anti-terror measures are in place throughout Oslo; a no-fly zone will be implemented in the skies above Ullevi Stadion and through all the tension it could be easy to forget that the national team are within touching distance of a first World Cup appearance for 27 years. Beating Israel would put them on the verge but the visitors' presence has added multiple layers of complexity and controversy.
For those unfamiliar, Veri is a minimal authentication framework for Rails that gives you building blocks for custom authentication flows. No generated controllers, views, and mailers, no forced business logic - just the core mechanics of secure authentication that you can build upon. What's included: Cookie-based authentication with database-stored sessions Multiple password hashing algorithms (argon2, bcrypt, pbkdf2, scrypt) Granular session management and control
According to OpenAI CEO Sam Altman, AgentKit is a visual tool for quickly building AI agents. "AgentKit is a complete set of building blocks available in the OpenAI platform designed to help you take agents from prototype to production. It is everything you need to build, deploy, and optimize agent workflows." He further states that AI is becoming increasingly capable, from a system you can ask anything to a system that can do everything for you. According to Altman, there is a lot of talk about AI agents, but they remain underutilized. He wants to solve that with AgentKit.
I'm where I am today because I stand on the shoulders of those who came before me, and I strongly believe in paying it forward. A good mentor listens, provides honest feedback, and helps you see opportunities beyond your current path. In security, mentorship is especially vital because so much of the profession is shaped by experience, judgment and context.
A new firmware update--Version: 25.06-12.02.00--for the PlayStation 5 console has gone live, and unsurprisingly, it doesn't do much. What this new update does is improve the security on your device, but don't expect to see any new major features added to your PS5 once it has been installed. "We've made some security fixes to the system software," reads the very succinct update notes.
Please update your systems to take care of a security related bug we found last month. Luis Falcon has found that trytond may log sensitive data like passwords when the logging level is set to INFO. ImpactCVSS v3.0 Base Score: 4.2 Attack Vector: Network Attack Complexity: Low Privileges Required: High User Interaction: None Scope: Unchanged Confidentiality: High Integrity: None Availability: None Workaround Increasing the logging level above INFO prevents logging of the sensitive data.
Europe, the president of the European Commission declared, is engaged in a fight for a continent that is whole and at peace. Her analysis of the problem was pretty accurate. What is increasingly clear, however, is that the European Union is not the whole solution. The EU is good at many things. Being an effective defence organisation is not one of them.
While iOS 26.0.1 includes several bug fixes and security updates, Apple highlights five of the most important changes in its notes. Firstly, an issue that saw Wi-Fi and Bluetooth occasionally disconnecting on iPhone 17, iPhone Air, and the iPhone 17 Pro models has been fixed. Next, the small number of iPhone users who were unable to reach a cellular network after updating to iOS 26 should now been able to connect.
Local law enforcement, along with the Secret Service, approached someone they said looked suspicious. And at that time, he told them that he was a member of law enforcement. He was armed. They continued to interview him, determined that he was not a member of law enforcement. He was taken into custody and remains in custody right now, Gray said.
This column has previously cited or recommended books on security, risk and leadership. Having just submitted a book manuscript to a publisher that explores the confluence of those three topics, I discovered that I drew most inspiration for my approach and analysis from works that don't directly relate to any of these subjects. (I should note that I tapped this column for content that I updated or more fully developed in the book).
As Washington Commanders quarterback Jayden Daniels made his way through the concourse of Capital One Arena following a Washington Capitals game in late April, he was forced to begrudgingly reach a conclusion about his status in the nation's capital that many had known for months: He was a big deal. On this day, the simple act of walking to the bathroom required the help of four to five security guards. There, a handful of fans tried to snap selfies with him.
Good morning. I was in Scottsdale yesterday, recording a podcast on site at Deloitte's Next Generation CEO Program, when news about the murder of conservative activist Charlie Kirk began to trickle in. We had been talking about the challenge of being a public figure in business or politics these days, the need for visionary and visible leadership, when visibility can come at a price.
I started using Linux prior to the advent of sudo. Back then, any time I needed to run admin tasks, I had to first su to the root user, run the task, and then exit the root user. Because root was enabled, some users would simply log in as root and forgo a standard user account altogether. That's a security risk no one should take.