Latest
Ready or Not: AI Will Transform Your Job
As artificial intelligence integrates into cybersecurity operations, it is automating alert triage and enhancing proactive threat detection. This evolution is amplifying both defensive and offensive capabilities.
Private Equity Firms Face Serious Cybersecurity Disconnect
A new survey reveals many private equity firms still shortchange cyber due diligence—leaving portfolios exposed to costly breaches and highlighting a persistent gap between risk awareness and real-world protection.
Fortune 500 Cyber Spending Pays Off: Large Enterprise Risk Falls 33% Despite Rising Threats
Here's what will surprise you: despite massive digital expansion, breach risk isn't uniformly climbing for all organizations. In fact, there are dramatic variations that challenge everything we thought we knew about cyber risk.
Bridging the IT-OT Divide: Securing the Future of Industrial Cybersecurity
HOU.SEC.CON 2024: Kevin Kumpf and Joe O’Donnell explain how bridging the IT-OT divide and modernizing security can help industry tackle workforce and cyber threats.
Securing the Modern Data Pipeline: Strategies for a Resilient Infrastructure
As enterprises build increasingly complex data pipelines to support AI and digital operations, security risks are growing. Misconfigurations and poor governance are opening the door to costly breaches. Here’s how to secure data pipelines from design to operation.
CYBR.SEC.Media Biweekly Roundup
From AI-powered factories to shifting federal regulations, we’re unpacking the forces reshaping cyber risk. Explore OT cloud security gaps, watch a real-world red team exploit, and hear insights from security leaders Jeremiah Grossman and Dmitri Alperovitch.
Real-World Penetration Testing Case Study | Red Team Lessons
How red teamers exploited a Jenkins flaw to take full control of a corporate network. Learn key lessons for enterprise defenders.
The Looming Threat of AI-Powered Malware
At HOU.SEC.CON 2024, Justin Hutchens reveals how AI-powered malware could outmaneuver traditional defenses, calling for urgent shifts in cybersecurity strategy.