Tag: technology
-
Review: AI Strategy and Security
AI Strategy and Security is a guide for organizations planning enterprise AI programs. The book targets technology leaders, security professionals, and executives responsible … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/19/review-ai-strategy-and-security/
-
Southeast Asia CISOs Top 13 Predictions for 2026: Securing AI, Centering Identity, and Making Resilience Strategic
Innovation and technology, Hand of robot touching a padlock of security on network connection of business, Data exchange, Financial and banking, AI, Cyber crime and internet security. iStock/ipopba First seen on csoonline.com Jump to article: www.csoonline.com/article/4117844/southeast-asia-cisos-13-top-predictions-for-2026-securing-ai-centering-identity-and-making-resilience-strategic.html
-
CISA, Allies Sound Alarm on OT Network Exposure
Joint US, UK and Five Eyes Guidance Flags OT Exposure as National Risk. U.S. and allied cyber agencies issued new guidance warning that insecure operational technology connectivity – driven by remote access, third-party vendors and IT integration – remains a major threat vector, enabling cyber intrusions to escalate into physical disruptions. First seen on govinfosecurity.com…
-
CISA Issues New AI Security Guidance for Critical Infrastructure
CISA and international partners issued new guidance on securing AI in operational technology, warning of OT risks and urging stronger governance and safeguards. The post CISA Issues New AI Security Guidance for Critical Infrastructure appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-cisa-ai-security-guidance-2026/
-
Are NHIs scalable for growing tech ecosystems
How Does Non-Human Identity Management Enhance Scalability in Tech Ecosystems? Is your organization struggling to keep pace with the scalability demands of emerging tech? With technology grow and evolve, the role of Non-Human Identities (NHIs) in ensuring seamless operations becomes increasingly significant. NHIs represent machine identities that are pivotal in cybersecurity, serving as the linchpin……
-
Incorporating Geopolitical Risk Into Your IT Strategy
Scenario Planning Must Model Disruption, Strengthen Cyber Basics, Build Redundancy. IT organizations know how to plan for outages, but even the most rigorously designed strategy is vulnerable to the shifting winds of geopolitics. CIOs and technology leaders need to know how their organizations will respond to geopolitical disruptions, and scenario planning needs to be a…
-
Seraphic Acquisition Arms CrowdStrike for AI Browser Threats
$420M Deal Enables Web Detection and Response, Secures AI-Driven Browser Activity. CrowdStrike is bolstering its Falcon platform with browser-native web detection and response by acquiring Seraphic for $420 million. The technology helps protect AI workflows by securing any browser against data leakage, session hijacking and other web-based threats. First seen on govinfosecurity.com Jump to article:…
-
Beyond Testing: API Security as the Foundational Intelligence for an ‘industry leader’-Level Security Strategy
Tags: ai, api, application-security, attack, business, ciso, communications, container, data, detection, gartner, governance, intelligence, risk, service, strategy, technology, tool, vulnerabilityIn today’s security landscape, it’s easy to get lost in a sea of acronyms. But one layer has become the undisputed foundation for modern application security: API security. Why? Because APIs are no longer just part of the application, they are the application. They are the connective tissue for microservices, third-party data, and the explosive…
-
SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats
Tags: access, ai, authentication, breach, business, communications, compliance, credentials, cybercrime, cybersecurity, dark-web, data, data-breach, defense, government, grc, group, identity, incident response, infosec, infrastructure, malware, monitoring, phishing, ransomware, risk, risk-management, service, supply-chain, technology, theft, threat, toolFor government agencies and critical infrastructure operators, supply chain threats present national security risks that demand heightened vigilance. Public sector organizations managing sensitive data and critical services increasingly rely on contractors and technology vendors whose compromised credentials could provide adversaries with pathways into classified systems or essential infrastructure. Last year alone, the top 98 Defense…
-
CrowdStrike to add browser security to Falcon with Seraphic acquisition
Gen AI altering browser risk: Generative AI has fundamentally altered the browser risk profile. Gogia noted that the browser is now a bidirectional data exchange, where employees routinely feed sensitive context into AI systems. Most of this activity happens outside formal enterprise governance. Copying internal data into AI prompts, uploading files for summarisation, or using…
-
Western cyber agencies warn about threats to industrial operational technology
New guidance issued by Britain’s National Cyber Secure Centre (NCSC), a part of signals and cyber intelligence agency GCHQ, sets out how organizations should securely connect equipment such as industrial control systems, sensors and other critical services. First seen on therecord.media Jump to article: therecord.media/cyber-agencies-warn-of-industrial-system-threats
-
CrowdStrike to Buy Seraphic Security in Bid to Boost Browser Security
The browser protection and detection technology will be integrated into CrowdStrike’s Falcon platform to protect endpoints, browser sessions, and cloud applications. First seen on darkreading.com Jump to article: www.darkreading.com/remote-workforce/crowdstrike-buy-seraphic-security-boost-browser-security
-
Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum
Tags: ai, attack, automation, business, ceo, ciso, control, country, cryptography, cyber, cybercrime, cybersecurity, data, detection, exploit, finance, framework, fraud, governance, healthcare, incident, infrastructure, international, middle-east, phishing, ransomware, resilience, risk, service, skills, software, strategy, supply-chain, technology, threat, tool, vulnerabilityAI is anticipated to be the most significant driver of change in cybersecurity in 2026, according to 94% of survey respondents;87% of respondents said AI-related vulnerabilities had increased in the past year. Other cyber risks that had increased were (in order) cyber-enabled fraud and phishing, supply chain disruption, and exploitation of software vulnerabilities;confidence in national cyber…
-
Driving Passwordless Adoption with FIDO and Biometric Authentication
Tags: access, attack, authentication, awareness, banking, breach, business, cloud, compliance, container, control, credentials, cyber, data, defense, fido, finance, fraud, government, Hardware, iam, identity, insurance, login, mobile, passkey, password, phishing, risk, service, technology, threat, trainingDriving Passwordless Adoption with FIDO and Biometric Authentication madhav Tue, 01/13/2026 – 06:13 For decades, passwords have been the default mechanism for securing digital access. They are deeply embedded in enterprise systems and workflows, yet they were never designed to withstand today’s threat landscape. Cybersecurity Sarah Lefavrais – IAM Product Marketing Manager More About This…
-
Why Do We Need Antivirus Software for Android? Top 4 Best Anti-Virus Their Impacts
Best Antivirus Software provides high-level data protection for your Android device since it is the main targeted platform around the world. People often rely on android more than themselves these days. The quotidian usage of technology has made them more and more dependent. From communication to connectivity to entertainment, all aspects are covered by such…
-
What insurers expect from cyber risk in 2026
Technology shifts, policy decisions, and attacker behavior are changing at the same time, and their effects increasingly overlap. Insurers, brokers, and security teams are … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/13/cybercube-insurance-cyber-risk-2026/
-
NIST Calls for Public to Help Better Secure AI Agents
NIST Seeks Input to Protect AI Systems Used in Government, Critical Infrastructure. The National Institute of Standards and Technology is seeking public input from security experts and stakeholders to weigh in on security threats from agentic AI warning they may be vulnerable to exploits like hijacking, backdoors and misaligned behavior across federal networks. First seen…
-
1Password Focuses on Identity Security in Agentic AI Era
Former AWS Exec Nancy Wang to Lead 1Password’s Agentic AI Security Strategy. 1Password named former AWS executive Nancy Wang as chief technology officer to oversee the evolution of its platforms to manage new artificial intelligence-driven workflows. Agents are really their own class of identities, Wang said. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/1password-focuses-on-identity-security-in-agentic-ai-era-a-30499
-
Tenable Is a Gartner® Peer Insights Customers’ Choice for Cloud-Native Application Protection Platforms
Tags: ai, api, attack, automation, banking, ciso, cloud, compliance, control, cybersecurity, data, detection, gartner, google, governance, healthcare, identity, infrastructure, microsoft, risk, risk-management, service, software, strategy, technology, tool, vulnerability, vulnerability-managementThis recognition, based entirely on feedback from the people who use our products every day, to us is a testament to the unmatched value Tenable Cloud Security CNAPP offers organizations worldwide. Our key takeaways: In our view, this peer recognition confirms Tenable’s strategic value in helping organizations worldwide, across all industry sectors, preemptively close critical…
-
How protected are your secrets in hybrid environments?
Are Your Machine Identities Secure in Hybrid Environments? Managing Non-Human Identities (NHIs) is becoming a crucial aspect of cybersecurity strategies, particularly in hybrid environments. But what are NHIs, and why should they matter to organizations operating in diverse sectors such as financial services, healthcare, and travel, particularly those utilizing cloud technology? Understanding Non-Human Identities and……
-
Most Popular Cybersecurity Blogs From 2025
What were the top government technology and cybersecurity blog posts in 2025? The metrics tell us what cybersecurity and technology infrastructure topics were most popular. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/most-popular-cybersecurity-blogs-from-2025/
-
How to stay ahead with Agentic AI in cybersecurity?
What Role Do Non-Human Identities Play in Enhancing Cybersecurity? One might wonder how machine identities fit into the puzzle. Non-Human Identities (NHIs), often underestimated, are pivotal in creating robust security frameworks, particularly for industries like financial services, healthcare, travel, and technology sectors. Their management is not just about protecting data; it’s about ensuring seamless operations……
-
How certain can we be about NHIs reliability?
Tags: technologyHow Secure Are Non-Human Identities in Today’s Digital Landscape? How confident are you in the security protocols protecting your organization’s machine identities? With technology evolves, the concept of Non-Human Identities (NHIs) becomes increasingly critical, especially in achieving reliable NHIs that are a cornerstone for digital security. NHIs, or machine identities, play a pivotal role in……

