A procurement team throws a small party. They’ve shaved millions off the supplier budget. The CFO beams. The board applauds. Six months…
News
Keep AI browsers out of your enterprise, warns Gartner
AI browsers including Perplexity Comet and OpenAI’s ChatGPT Atlas present security risks that cannot be adequately mitigated, and enterprises should prevent employees…
KI schafft neue Sicherheitsrisiken für OT-Netzwerke
Sicherheitsbehörden sehen in der vermehrten Nutzung von KI eine Gefahr für die Sicherheit von OT-Systemen. Durch bigjom jom – shutterstock.com Die Sicherheit…
Offensive security takes center stage in the AI era
Sara Madden is looking to take a more offensive approach to safeguarding her company. The Convera CISO wants to add a red…
Vaillant CISO: NIS2 complexity and lack of clarity endanger its mission
CSO Germany: The energy sector is increasingly becoming a target for cybercriminals. Experts and the Federal Office for Information Security (BSI) believe that protection…
Warning: React2Shell vulnerability already being exploited by threat actors
Plugging the React2Shell vulnerability in the open source React server and Next.js in IT environments has just become even more urgent with…
Insecure use of Signal app part of wider Department of Defense problem, suggests Senate report
The Signalgate scandal that enveloped US Secretary of Defense Pete Hegseth in March appears to be symptomatic of a wider lax attitude…
Chinese cyberspies target VMware vSphere for long-term persistence
Chinese state-sponsored threat actors are backdooring VMware vCenter and VMware ESXi servers with a malware program written in Go, allowing them to…
Identity Management and Information Security News for the Week of December 5th: CrowdStrike, BeyondTrust, Incode Technologies, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Hardening browser security with zero-trust controls
The shift from perimeter-based security to zero trust is now indispensable for combating modern threats. The obsolete “castle-and-moat” model, granting implicit trust…