Tag: technology
-
How SCSU Is Rebuilding Campus Technology for the AI Era
Southern Connecticut State University CIO Tom Armstrong on Modernization Priorities. Like other schools, Southern Connecticut State University is under pressure to modernize legacy systems, strengthen security and adopt AI. CIO Tom Armstrong must balance expanding research ambitions, student expectations and operational efficiency in an increasingly complex risk environment. First seen on govinfosecurity.com Jump to article:…
-
Ukraine tightens controls on Starlink terminals to counter Russian drones
Ukraine has rolled out a verification system for Starlink satellite internet terminals used by civilians and the military after confirming that Russian forces have begun installing the technology on attack drones. First seen on therecord.media Jump to article: therecord.media/ukraine-tightens-starlink-controls-counter-russian-drones
-
MomentProof Deploys Patented Digital Asset Protection
Washington, DC, February 4th, 2026, CyberNewsWire MomentProof, Inc., a provider of AI-resilient digital asset certification and verification technology, today announced the successful deployment of MomentProof Enterprise for AXA, enabling cryptographically authentic, tamper-proof digital assets for insurance claims processing. MomentProof’s patented technology certifies images, video, voice recordings, and associated metadata at the moment of capture, ensuring…
-
OT attacks surge as threat actors embrace cloud and AI, warns Forescout
Cyberattacks targeting operational technology (OT) environments rose sharply in 2025, according to new research from Forescout, highlighting growing risks to critical infrastructure as attackers adapt to cloud services, AI platforms and increasingly distributed attack infrastructure. Forescout’s 2025 Threat Roundup Report, produced by its research arm Vedere Labs, analysed more than 900 million cyberattacks observed globally…
-
Beyond the Chatbot: Why NIST is Rewriting the Rules for Autonomous AI
The chatbot era has ended. For two years, we’ve interacted with digital assistants that summarize emails and suggest recipes, but the National Institute of Standards and Technology (NIST) now draws a definitive line between machines that talk and machines that act. Their newly released Request for Information (RFI) signals a fundamental paradigm shift in how..…
-
Zero trust in practice: A deep technical dive into going fully passwordless in hybrid enterprise environments
Tags: access, attack, authentication, backup, breach, business, cloud, compliance, credentials, cybersecurity, data, endpoint, group, Hardware, identity, infrastructure, lessons-learned, network, password, phishing, phone, risk, service, technology, update, windows, zero-trustArchitecture decisions: Hybrid authentication flows and Windows Hello for Business: Once your prerequisites are in place, you face critical architectural decisions that will shape your deployment for years to come. The primary decision point is whether to use Windows Hello for Business, FIDO2 security keys or phone sign-in as your primary authentication mechanism.In my experience,…
-
One Identity Appoints Gihan Munasinghe as Chief Technology Officer
Alisa Viejo, United States, February 4th, 2026, CyberNewsWire One Identity, a leader in unified identity security, today announced the appointment of Gihan Munasinghe as Chief Technology Officer. Munasinghe brings more than 15 years of experience leading global engineering organizations and delivering large-scale, customer-centric software platforms. In this role, he will lead the engineering organization and set…
-
One Identity Appoints Gihan Munasinghe as Chief Technology Officer
Alisa Viejo, United States, 4th February 2026, CyberNewsWire First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer/
-
One Identity Appoints Gihan Munasinghe as Chief Technology Officer
Alisa Viejo, United States, 4th February 2026, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer/
-
NDSS 2025 BinEnhance
Tags: china, conference, data, detection, framework, Internet, network, software, technology, vulnerabilitySession 11B: Binary Analysis Authors, Creators & Presenters: Yongpan Wang (Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China), Hong Li (Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China), Xiaojie Zhu (King Abdullah University of Science and Technology, Thuwal, Saudi…
-
Microsoft Takes Major Security Step by Disabling NTLM Authentication by Default
Microsoft is making a significant move to strengthen Windows security by phasing out NTLM (New Technology LAN Manager). This legacy authentication protocol has been part of Windows for over 30 years. The company plans to disable NTLM by default in upcoming Windows releases, replacing it with more secure Kerberos-based alternatives. NTLM is an old authentication…
-
How deepfake scams are fueling a new wave of fraud
<div cla Scammers are using deepfake technology to replicate your child’s voice in a kidnapping hoax, catfish with AI-generated video dates, and impersonate executives to steal millions. Learn how to spot deepfake fraud, and use Avast Deepfake Guard to help verify what’s real before it’s too late. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/how-deepfake-scams-are-fueling-a-new-wave-of-fraud-2/
-
Outages Happen to Everyone. Building a Resilient Architecture Doesn’t Have to Be Hard.
Tags: access, ai, attack, breach, business, cloud, compliance, computing, container, control, csf, cyberattack, data, defense, detection, dora, encryption, finance, framework, government, nist, regulation, resilience, service, software, strategy, technologyOutages Happen to Everyone. Building a Resilient Architecture Doesn’t Have to Be Hard. madhav Tue, 02/03/2026 – 05:21 No company is spared the pain of outages. But their impact can be mitigated by how resilient you build your business architecture. And who you choose to partner with can significantly determine how effective that will be.…
-
NDSS 2025 Preventing Channel Depletion Via Universal and Enhanced Multi-Hop Payments
Tags: blockchain, china, computer, conference, framework, Internet, network, risk, software, technologySession 11A: Blockchain Security 2 Authors, Creators & Presenters: Anqi Tian (Institute of Software, Chinese Academy of Sciences; School of Computer Science and Technology, University of Chinese Academy of Sciences), Peifang Ni (Institute of Software, Chinese Academy of Sciences; Zhongguancun Laboratory, Beijing, P.R.China), Yingzi Gao (Institute of Software, Chinese Academy of Sciences; University of Chinese…
-
Why Your WAF Missed It: The Danger of Double-Encoding and Evasion Techniques in Healthcare Security
Tags: access, ai, api, attack, data, data-breach, detection, exploit, governance, hacker, healthcare, intelligence, malicious, risk, technology, threat, tool, wafThe “Good Enough” Trap If you ask most organizations how they protect their APIs, they point to their WAF (Web Application Firewall). They have the OWASP Top 10 rules enabled. The dashboard is green. They feel safe. But attackers know exactly how your WAF works, and, more importantly, how to trick it. We recently worked…
-
Ex-Google Engineer Convicted of Stealing AI Data for China
Linwei Ding Faces Decades in Prison for Trade Secret Theft, Espionage. A federal jury in San Francisco convicted a former Google software engineer of stealing thousands of pages of confidential AI data and transferring it to Chinese technology companies. Linwei Ding is guilty of seven counts of economic espionage and seven counts of trade secret…
-
Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows environments toward stronger, Kerberos-based options.The development comes more than two years after the tech giant revealed its plans to deprecate the legacy technology, citing its susceptibility to weaknesses that could facilitate relay attacks…
-
Microsoft sets a path to switch off NTLM across Windows
Windows is shifting to a more secure authentication approach, moving away from New Technology LAN Manager (NTLM) and toward stronger, Kerberos-based options. NTLM has been … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/02/microsoft-windows-ntlm-disabling/
-
How can Agentic AI transform DevOps security
What is the Role of Agentic AI in DevOps Security? How can organizations ensure the security of machine identities and secrets? A comprehensive security strategy, encompassing Non-Human Identities (NHIs) and Secrets Security Management, is crucial. This necessitates a reimagining of how cybersecurity frameworks can adapt to the rapid advancements in technology, particularly through the integration……
-
Startup Amutable plotting Linux security overhaul to counter hacking threats
Tags: attack, backdoor, ceo, cloud, computer, computing, container, cve, cybercrime, data, exploit, fortinet, hacking, infrastructure, kubernetes, linux, microsoft, open-source, skills, software, startup, supply-chain, technology, threat, tool, training, vpn, vulnerabilitysystemd, he has alongside him two other ex-Microsoft employees, Chris Kühl as CEO, and Christian Brauner as CTO.A clue to Amutable’s plans lies in the announcement’s emphasis on some of its founders’ backgrounds in Kubernetes, runc, LXC, Incus, and containerd, all connected in different ways to the Linux container stack. Computing is full of security…
-
2026: The Year Agentic AI Becomes the Attack-Surface Poster Child
Dark Reading asked readers whether agentic AI attacks, advanced deepfake threats, board recognition of cyber as a top priority, or password-less technology adoption would be most likely to become a trending reality for 2026. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/2026-agentic-ai-attack-surface-poster-child
-
Russia-Aligned ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
The “coordinated” cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian state-sponsored hacking crew known as ELECTRUM.Operational technology (OT) cybersecurity company Dragos, in a new intelligence brief published Tuesday, described the late December 2025 activity as the first major cyber attack targeting distributed energy First…
-
Russia-Aligned ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
The “coordinated” cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian state-sponsored hacking crew known as ELECTRUM.Operational technology (OT) cybersecurity company Dragos, in a new intelligence brief published Tuesday, described the late December 2025 activity as the first major cyber attack targeting distributed energy First…
-
Acumen Cyber Further Strengthens Board with Appointment of Derek Whigham
Acumen Cyber, an engineer powered cyber security service provider, has announced the appointment of Derek Whigham as Non Executive Director and Strategic Advisor, strengthening the company’s leadership team as it continues to scale across the UK. Derek is a globally recognised cyber security and technology leader with more than 28 years of experience across financial…
-
Home Office announces sweeping police technology plans
The Home Office plans to ramp up its deployment of artificial intelligence and facial-recognition technologies under wide-ranging reforms to UK policing First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366638196/Home-Office-announces-sweeping-police-technology-plans
-
Home Office announces sweeping police technology plans
The Home Office plans to ramp up its deployment of artificial intelligence and facial-recognition technologies under wide-ranging reforms to UK policing First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366638196/Home-Office-announces-sweeping-police-technology-plans
-
Exploring Identity Management and CardSpace Technology
A deep dive into the evolution of identity management and cardspace technology. Learn how modern enterprise sso and ciam solutions replace legacy frameworks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/exploring-identity-management-and-cardspace-technology/
-
EFF calls out major tech companies on encryption promises
The Electronic Frontier Foundation (EFF) has introduced a new campaign called Encrypt It Already, focused on expanding the use of end-to-end encryption in consumer technology … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/30/electronic-frontier-foundation-encrypt-it-already/
-
How does Agentic AI foster innovation in tech
What is Agentic AI, and How Is It Changing the Landscape of Technology? Where technology evolves at warp speed, how do organizations ensure they stay ahead of the curve? One approach gaining traction is leveraging Agentic AI to drive innovation across various sectors. Agentic AI, a term often associated with autonomous decision-making systems, is paving……

