Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
The potential for supply chain attacks has grown as cybercriminals become more adept at exploiting open-source libraries. But companies haven’t moved fast enough to take adequate counter measures. → Read More
AI tools are proving effective in identifying anomalies and potential threats in real time, ultimately shutting down breaches. → Read More
E-commerce, retailers, and mass merchants can't afford to lose the AI war to attackers. With weaponized AI on the rise and attackers... → Read More
An effective zero-trust framework can help reduce the blast radius of generative AI attacks and establish a first line of defense. → Read More
Data governance, risk management and compliance are core drivers of the data security market — so is preparing for quantum computing threats. → Read More
Honeywell's acquisition of SCADAfence is a response to cybersecurity gaps resulting from unprotected IoT sensors and devices. → Read More
Why getting microsegmentation right in multicloud configurations can make or break any zero-trust initiative. → Read More
The era of weaponized AI is here, and XDR platforms need to gain value from AI and ML technologies to strengthen the cybersecurity industry. → Read More
CNAPPs prove an effective consolidation catalyst because their unified platform meets multiple security and compliance requirements. → Read More
Five ways new generative AI tools for crafting malicious cyberattacks will start to define the future of cybersecurity. → Read More
With additional funding and its open-source Baton SDK, cybersecurity startup ConductorOne is well positioned to reinvent IAM. → Read More
Nightfall AI's platform is the first data loss prevention (DLP) platform that scales across the three top threat vectors CISOs need the most help securing when generative AI and ChatGPT are in use across their organizations. → Read More
Organizations have become too complacent with legacy IAM, VPN, and perimeter-based network security systems. Zero trust edge (ZTE) can help. → Read More
Annual IBM report finds investing in AI, automation and threat intelligence delivers shorter breach lifecycles, lower breach costs. → Read More
ChatGPT and generative AI are already helping strengthen zero trust cybersecurity. Here are 10 ways it's doing so now or will soon. → Read More
RSAC 2023 showed AI and new partnerships are now key to cybersecurity, with efficacy and visibility among the essential goals. → Read More
Harvest-now, decrypt-later attacks are on the rise. The time to start planning for post-quantum cryptography is now. → Read More
With venture funding cooling off but cybersecurity needs increasing, here are our top 20 zero-trust startups to watch in 2023. → Read More
The many reasons combining endpoint security and identity security on one platform is becoming key to a successful zero trust strategy. → Read More
Survey results suggest the importance of a data-driven approach to managing machine identities at scale in order to strengthen zero trust. → Read More