Tag: technology
-
Most Popular Cybersecurity Blogs From 2025
What were the top government technology and cybersecurity blog posts in 2025? The metrics tell us what cybersecurity and technology infrastructure topics were most popular. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/most-popular-cybersecurity-blogs-from-2025/
-
How to stay ahead with Agentic AI in cybersecurity?
What Role Do Non-Human Identities Play in Enhancing Cybersecurity? One might wonder how machine identities fit into the puzzle. Non-Human Identities (NHIs), often underestimated, are pivotal in creating robust security frameworks, particularly for industries like financial services, healthcare, travel, and technology sectors. Their management is not just about protecting data; it’s about ensuring seamless operations……
-
How certain can we be about NHIs reliability?
Tags: technologyHow Secure Are Non-Human Identities in Today’s Digital Landscape? How confident are you in the security protocols protecting your organization’s machine identities? With technology evolves, the concept of Non-Human Identities (NHIs) becomes increasingly critical, especially in achieving reliable NHIs that are a cornerstone for digital security. NHIs, or machine identities, play a pivotal role in……
-
Cybersicherheit ist zentral, doch IT-Dienstleister setzen sie zu selten an die erste Stelle
Die Global Technology Industry Association (GTIA) hat die »Channel Trends in Cybersecurity 2025«-Studie für Deutschland, Österreich und die Schweiz veröffentlicht. Die Studie ist Teil einer weltweiten Umfrage bei IT-Dienstleistern (ITSPs) in sechs Regionen[1]. Sie zeigt, wie Channel-Partner die Chancen der Cybersicherheit nutzen und sich in diesem wachsenden Markt als führend positionieren können. Mit der Untersuchung……
-
What roles do Agentic AI play in innovation?
How Secure Are Your Non-Human Identities in Cloud Environments? Are your organization’s digital assets as secure as they could be? Ensuring the security of Non-Human Identities (NHIs) has become an essential focus for cybersecurity professionals. Organizations operating across diverse industries like finance, healthcare, travel, and technology rely heavily on machine identities to automate business processes….…
-
Beyond “Is Your SOC AI Ready?” Plan the Journey!
You read the “AI-ready SOC pillars” blog, but you still see a lot of this: Bungled AI SOC transition How do we do better? Let’s go through all 5 pillars aka readiness dimensions and see what we can actually do to make your SOC AI-ready. #1 SOC Data Foundations As I said before, this one is my…
-
Campaigners urge UK to develop digital sovereignty strategy
UK digital rights campaigners have urged UK parliamentarians to implement a digital sovereignty strategy as part of the forthcoming Cybersecurity and Resilience Bill to reduce reliance on technology subject to foreign interference First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637125/Campaigners-urge-UK-to-develop-digital-sovereignty-strategy
-
CrowdStrike Acquires SGNL for $740 Million to Thwart AI-Powered Cyber Threats
Tags: ai, credentials, crowdstrike, cyber, cybersecurity, defense, exploit, hacker, identity, intelligence, startup, technology, threatCrowdStrike Inc. said Thursday it will acquire identity security startup SGNL in a deal valued at $740 million the latest move by the cybersecurity giant to fortify its defenses against increasingly sophisticated artificial intelligence (AI)-powered cyberattacks. The acquisition centers on SGNL’s continuous identity technology, designed to prevent hackers from exploiting user credentials as entry.. First…
-
Zero-Knowledge Compliance: How Privacy-Preserving Verification Is Transforming Regulatory Technology
Traditional compliance often forces companies to expose sensitive information to prove they follow the rules. This approach increases the risk of breaches and raises severe privacy concerns. With rising regulatory pressure and stricter data sovereignty laws, more organizations are exploring zero-knowledge frameworks as a safer alternative. Zero-knowledge proofs (ZKPs) allow businesses to prove adherence without..…
-
How scalable are secret management methods for NHIs?
How Do Non-Human Identities Influence Cybersecurity Strategies? What role do Non-Human Identities (NHIs) play in your cybersecurity strategy? Where technology is increasingly shaped by machine-to-machine interactions, the significance of NHIs has grown exponentially. These identities are not just essential but central to infrastructure integrity. NHIs encompass machine identities, which are represented through unique “Secrets” such……
-
What innovations are shaping Agentic AI today?
How Does Agentic AI Transform NHI Management? Are cybersecurity professionals fully leveraging Agentic AI for Non-Human Identities (NHIs) and Secrets Security Management? With technology advances, the integration of Agentic AI into cybersecurity practices has become crucial, especially when dealing with NHIs. These machine identities, formed by combining encrypted credentials with access permissions, are paramount in……
-
FDA Takes Hands-Off Approach to AI Devices and Software
Agency: Guidance Favors Market Innovation Over Federal Scrutiny. New artificial intelligence-enabled health wearable devices and clinical decision support software will not face U.S. Food and Drug Administration regulatory scrutiny, providing the technology meets certain criteria, such as being low-risk, the agency said this week. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/fda-takes-hands-off-approach-to-ai-devices-software-a-30465
-
Cyber Flatlines in FY 2026 Justice, Commerce Spending Bill
Congress Holds Cyber Funding at 2024 Levels Across Key Civilian Agencies. The fiscal year 2026 budget deal largely locks in federal cybersecurity funding at 2024 levels, stalling growth across key civilian agencies even as lawmakers call for global technology leadership as the U.S. government faces mounting nation-state cyber threats. First seen on govinfosecurity.com Jump to…
-
Deception Tech Snares Shiny Hunter Attacker’s IP Address
Targeted Threat Intel Firm Shares Details With Police After Honeypot Hit Getting owned by deception technology isn’t good news for one’s criminal brand or ability to remain at large. Just ask the band of young hackers behind Scattered Lapsus$ Shiny Hunters, when one of their ilk fell into a security firm’s honeytrap, revealing his actual…
-
NDSS 2025 Automatic Insecurity: Exploring Email Auto-configuration In The Wild
Tags: attack, conference, credentials, cyber, email, Internet, network, technology, threat, vulnerabilitySession 8A: Email Security Authors, Creators & Presenters: Shushang Wen (School of Cyber Science and Technology, University of Science and Technology of China), Yiming Zhang (Tsinghua University), Yuxiang Shen (School of Cyber Science and Technology, University of Science and Technology of China), Bingyu Li (School of Cyber Science and Technology, Beihang University), Haixin Duan (Tsinghua…
-
How to eliminate IT blind spots in the modern, AI-driven enterprise
Tags: access, ai, api, attack, automation, awareness, cio, cloud, control, data, detection, endpoint, governance, group, identity, injection, intelligence, metric, monitoring, network, radius, risk, service, technology, tool, training, vulnerabilityThe more organizations lean on artificial intelligence (AI), spread workloads across different environments, and tie systems together, the harder it becomes for traditional security practices to present a complete picture of what’s going on. The result is a growing number of blind spots hidden misconfigurations, inconsistent controls, and unpredictable behaviors across systems and AI agents…
-
How to eliminate IT blind spots in the modern, AI-driven enterprise
Tags: access, ai, api, attack, automation, awareness, cio, cloud, control, data, detection, endpoint, governance, group, identity, injection, intelligence, metric, monitoring, network, radius, risk, service, technology, tool, training, vulnerabilityThe more organizations lean on artificial intelligence (AI), spread workloads across different environments, and tie systems together, the harder it becomes for traditional security practices to present a complete picture of what’s going on. The result is a growing number of blind spots hidden misconfigurations, inconsistent controls, and unpredictable behaviors across systems and AI agents…
-
8 things CISOs can’t afford to get wrong in 2026
Tags: access, advisory, ai, attack, automation, awareness, breach, business, ciso, cloud, communications, compliance, control, cyber, cyberattack, cybersecurity, data, data-breach, defense, dora, encryption, finance, firmware, GDPR, healthcare, identity, incident response, india, infrastructure, injection, insurance, intelligence, iot, jobs, law, malicious, monitoring, network, privacy, ransom, regulation, resilience, risk, saas, scam, service, software, strategy, supply-chain, tactics, technology, theft, threat, tool, training, update, vulnerability, zero-trust“Identity and access controls for AI agents and AI platforms are one of the most important areas of concern for CISOs,” says Jason Stading, director at global technology research and advisory firm ISG. “Right now, permissions and access rights for AI are a black box in many areas. We will see a major push over…
-
Automated data poisoning proposed as a solution for AI theft threat
Tags: ai, breach, business, cyber, data, encryption, framework, intelligence, LLM, malicious, microsoft, resilience, risk, risk-management, technology, theft, threatKnowledge graphs 101: A bit of background about knowledge graphs: LLMs use a technique called Retrieval-Augmented Generation (RAG) to search for information based on a user query and provide the results as additional reference for the AI system’s answer generation. In 2024, Microsoft introduced GraphRAG to help LLMs answer queries needing information beyond the data on…
-
Threats to Critical Infrastructure Expected to Intensify
Geopolitics Puts OT at Greater Risk From Nation States, Criminals and Hacktivists. Attacks against critical infrastructure are expected to increase in scope and intensity including hacks on operational technology systems. State actors are now looking for ways to cause damage and disrupt operations, rather than simply steal secrets, according to cybersecurity experts. First seen on…
-
Nvidia Bets on Reasoning AI for Self-Driving Cars
Chipmaker CEO Huang Launches Alpamayo Models, Rubin Platform. Nvidia CEO Jensen Huang launched Alpamayo, an open reasoning AI model family for autonomous vehicles, and Rubin, a six-chip platform promising AI tokens at one-tenth prior costs. Mercedes Benz CLA will feature the technology in the US this year. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/nvidia-bets-on-reasoning-ai-for-self-driving-cars-a-30454
-
NDSS 2025 HADES Attack: Understanding And Evaluating Manipulation Risks Of Email Blocklists
Tags: attack, conference, dns, email, exploit, infrastructure, Internet, malicious, mitigation, network, risk, service, spam, technologySession 8A: Email Security Authors, Creators & Presenters: Ruixuan Li (Tsinghua University), Chaoyi Lu (Tsinghua University), Baojun Liu (Tsinghua University;Zhongguancun Laboratory), Yunyi Zhang (Tsinghua University), Geng Hong (Fudan University), Haixin Duan (Tsinghua University;Zhongguancun Laboratory), Yanzhong Lin (Coremail Technology Co. Ltd), Qingfeng Pan (Coremail Technology Co. Ltd), Min Yang (Fudan University), Jun Shao (Zhejiang Gongshang University)…
-
Threat Actors Exploit Office Assistant to Deliver Malicious Mltab Browser Plugin
A sophisticated malware campaign has been discovered exploiting Office Assistant, a widely used AI-powered productivity software in China, to distribute a malicious browser plugin that hijacks user traffic and exfiltrates sensitive information. The RedDrip Team from QiAnXin Technology’s Threat Intelligence Center uncovered this operation, which has been active since at least May 2024 and has…
-
6 strategies for building a high-performance cybersecurity team
Tags: advisory, ai, apple, attack, business, ciso, communications, compliance, cyber, cybersecurity, data, defense, intelligence, resilience, risk, service, skills, strategy, technology, threat, tool, training, update, vulnerability2. Be clear on the mission: Sharon Chand, US cyber defense and resilience leader at professional services firm Deloitte, says a characteristic of a high-performing team is alignment on the team’s mission.To do that, though, team members need to know what the mission is and buy into it.”It has to be a very clear mission…
-
6 strategies for building a high-performance cybersecurity team
Tags: advisory, ai, apple, attack, business, ciso, communications, compliance, cyber, cybersecurity, data, defense, intelligence, resilience, risk, service, skills, strategy, technology, threat, tool, training, update, vulnerability2. Be clear on the mission: Sharon Chand, US cyber defense and resilience leader at professional services firm Deloitte, says a characteristic of a high-performing team is alignment on the team’s mission.To do that, though, team members need to know what the mission is and buy into it.”It has to be a very clear mission…
-
NIST and MITRE partner to test AI defense technology for critical infrastructure
Experts said the new partnership should focus on making AI-based systems more reliable. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/nist-ai-security-critical-infrastructure-mitre-center/808652/
-
Largest Cyber Stocks Feast in 2025, as Smaller Stocks Famish
Investors Increasingly See Each Security Technology Category as Winner-Take-All The chasm between the cyber haves and cyber have nots widened in 2025, with most large security companies recording stock price gains while smaller companies logged losses. Of the 11 public cyber vendors with valuations exceeding $14.9 billion, the stock price rose for nine of those…

