| Date | Title | Description |
| 10.04.2026 | Mythos autonomously exploited vulnerabilities that survived 27 years of human review. Security teams need a new detection playbook | A 27-year-old bug sat inside OpenBSD’s TCP stack while auditors reviewed the code, fuzzers ran against it, and the operating system earned its reputation as one of the most security-hardened platforms on earth. Two packets could crash any s... |
| 01.04.2026 | Ivanti Appoints Jai Sahney as Senior Vice President, Asia Pacific & Japan | Sahney will drive Ivanti's growth in APJ, boost customer and partner engagement, and build a high-performance team aligned with the company's global vision.
SINGAPORE, April 1, 2026 /PRNewswire/ -- Ivanti, a global enterprise IT and securit... |
| 25.03.2026 | The best software asset management (SAM) platforms | Share
Share
Share
Share
Email
Software Asset Management (SAM) platforms play an essential role in helping large organizations rein in software costs, ensure compliance and manage sprawling digital assets. With hybrid work models and increas... |
| 07.03.2026 | Hexnode debuts device-aware IdP to fuse identity & UEM | - |
| 06.03.2026 | Enterprise Tech Facing Record Zero‑Day Pressure, Finds Google | Enterprise tech firms are squarely in attackers’ crosshairs, with half of all last year’s zero-day exploits hitting them directly, according to the latest report from Google’s Threat Intelligence Group (GTIG).
While the number of tracked ze... |
| 24.02.2026 | Most ransomware playbooks don't address machine credentials. Attackers know it. | The gap between ransomware threats and the defenses meant to stop them is getting worse, not better. Ivanti’s 2026 State of Cybersecurity Report found that the preparedness gap widened by an average of 10 points year over year across every ... |
| 19.02.2026 | ITSX Summit | Just Two Weeks to Go! | DIGIT’s ITSX Summit returns to Dynamic Earth in Edinburgh in just two weeks – register now!
Taking place on 5 March, the conference will contextualise the evolution of the service desk and the future of customer experience and IT support.
T... |
| 12.02.2026 | Nine in 10 UK Security Teams Now Prioritise Agentic AI | More than nine in 10 UK security teams now view adopting agentic AI as a priority, according to new research from enterprise IT and security software firm Ivanti, as organisations look to close a widening gap between rising cyber threats an... |
| 11.02.2026 | European Governments Targeted in Zero-Day Attacks | The Europen Commission has revealed it is investigating a potential data breach into its central mobile device managing infrastrcuture, which could have exposed thousands of users’ personal details.
The incident occurred on 30 January but w... |
| 06.02.2026 | Exclusive: Yuvraj Pradhan warns legacy VPNs are now a security risk | - |
| 27.01.2026 | Ivanti expands Neurons platform with agentic AI and asset visibility upgrades
Send us a News Tip
EXTRACT THE SIGNAL FROM THE NOISE
Cookies | Information technology security software company Ivanti Inc. today unviled new artificial intelligence advances to its Neurons platform that helps IT and security teams harness AI-driven intelligence to achieve impactful business outcomes.
... |
| 19.01.2026 | Функциональное тестирование «Континент 4» в режиме «Детектор атак»: сравнение с Palo Alto в лаборатории INSI | Меня зовут Ильдар Ишкинин, я ведущий инженер Центра компетенций Innostage. После лабораторного тестирования производительности NGFW «Континент 4» в условиях высокой нагрузки мы перешли ко второму этапу. На этот раз мы оценивали не силу, а и... |
| 16.01.2026 | Accertify Appoints CEO and Expands Executive Team to Fuel Next Phase of Growth | Accertify, Inc., a leading unified risk decisioning platform provider, today announced the appointment of Greg Dukat as CEO of the company, along with several key additions to its leadership team. This leadership expansion supports the comp... |
| 25.12.2025 | Я сделаю свои групповые политики – с наследованием и фильтрами | Привет Хабр! Я Дмитрий Закорючкин, в компании Avanpost я занимаюсь развитием нашей службы каталогов, Avanpost Directory Service.
Сегодня я хотел бы поговорить о групповых политиках и их применимости в Linux-мире. Тема для меня близкая не то... |
| 09.12.2025 | Only 23% of Organisations Have Advanced DEX Maturity, Ivanti Finds | Ivanti’s new 2025 Digital Employee Experience Report suggests that many organisations may be overestimating their success in delivering effective digital experiences for staff, even as employee frustration, tech-related interruptions and st... |
| 29.08.2025 | Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds | Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now
“With volatility now the norm, security and risk leaders need practical guidance on... |
| 29.08.2025 | What Clear Trends Are Emerging For Cybersecurity in 2025? | A new half-year review from Recorded Future shows an expanding and increasingly fragmented threat landscape in the first half of 2025.
The report, titled H1 Malware and Vulnerability Trends, disclosed vulnerabilities rose, threat actors con... |
| 31.07.2025 | GreyNoise Intelligence Releases New Research Linking Cyber Threat Actor Activity to Future Vulnerabilities | New research from GreyNoise found that spikes in attacker activity appear to precede newly announced vulnerabilities, presenting a significant challenge to conventional reactive security models.
Identifies correlation between spikes in mali... |
| 30.07.2025 | BlinkOps Secures $50M: Revolutionizing Enterprise Cybersecurity with AI Micro-Agents | BlinkOps, a San Francisco firm, secured $50M in Series B funding. Total investment reached $90M. The company spearheads no-code security micro-agents. Its AI-driven platform automates complex cybersecurity workflows. Rapid Fortune 500 enter... |
| 30.07.2025 | Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports | Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now
Shadow AI is the $670,000 problem most organizations don’t even know they have.
IBM... |
| 28.07.2025 | BlinkOps raises $50M to expand deployment of no-code security micro-agents
Join theCUBE Alumni Trust Network
Send us a News Tip
EXTRACT THE SIGNAL FROM THE NOISE
Cookies | Enterprise cybersecurity automation platform Blink Operations Inc. today revealed that it has raised $50 million in new funding to accelerate its go-to-market efforts and scale updeployment of its no-code cybersecurity micro-agents platform... |
| 10.07.2025 | $8.8 trillion protected: How one CISO went from ‘that’s BS’ to bulletproof in 90 days | Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now
VentureBeat’s exclusive interview with Sam Evans, CISO of Clearwater Analytics, rev... |
| 30.06.2025 | Vietnam's Viettel Group Excels at the Prestigious Global Technology Awards | HANOI, Vietnam, June 30, 2025 /PRNewswire/ -- Recently, Viettel Group, a Vietnam state-owned corporation, won 19 awards at the Globee Awards for Technology 2025, one of the most prestigious international awards in the field of information t... |
| 27.06.2025 | How runtime attacks turn profitable AI into budget black holes | This article is part of VentureBeat’s special issue, “The Real Cost of AI: Performance, Efficiency and ROI at Scale.” Read more from this special issue.
AI’s promise is undeniable, but so are its blindsiding security costs at the inference ... |
| 25.06.2025 | Enterprises must rethink IAM as AI agents outnumber humans 10 to 1 | Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more
Stolen credentials are responsible for 80% of enterprise breaches. Every major sec... |
| 29.05.2025 | The Cybersecurity Crisis: A Wake-Up Call for UK Firms | The digital landscape is a battlefield. Cyber threats lurk in the shadows, waiting for a moment of weakness. Recent events have painted a grim picture of the cybersecurity landscape in the UK. Major firms, from fintechs to retail giants, ar... |
| 28.05.2025 | NHS patient data at risk in major cyber attack | A newly uncovered cyber attack has exposed sensitive information at two major NHS trusts, raising fears that patient records could be at risk.
Experts have warned that the hack, linked to a vulnerability in widely used mobile management sof... |
| 16.05.2025 | Shrink exploit windows, slash MTTP: Why ring deployment is now a must for enterprise defense | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Unpatched systems are a ticking time bomb. Fifty-seven percent of cyberattack victims acknowledge that available ... |
| 13.05.2025 | What your tools miss at 2:13 AM: How gen AI attack chains exploit telemetry lag – Part 2 | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Generative AI is creating a digital diaspora of techniques, technologies and tradecraft that everyone, from rogue... |
| 10.05.2025 | The Hidden World of AI in the Workplace: Secrets, Struggles, and Solutions | In the shadows of corporate America, a quiet revolution is taking place. Employees are turning to artificial intelligence (AI) tools to boost their productivity. Yet, many are keeping their use a secret. A recent survey reveals that 32% of ... |
| 06.05.2025 | A third of employees keep their AI use secret | A new survey finds that 32 percent of employees who use GenAI tools at work say they're keeping it a secret from their employer.
The research from Ivanti finds that some use discretion when using AI because they like the 'secret advantage' ... |
| 06.05.2025 | A Third of Employees Keep Their AI Usage A Secret | Nearly a third (32%) of employees using GenAI tools at work say they are keeping it a secret from their employer, new research from Ivanti says.
The enterprise software company surveyed over 6,000 office workers and 1,200 IT and cybersecuri... |
| 04.05.2025 | Ivanti: Refinancing Closed To Support Key Initiatives | Ivanti, an enterprise software company providing a comprehensive IT and security cloud-based platform, announced that it has closed a refinancing transaction. This was achieved by supporting an overwhelming majority of its existing lenders.... |
| 26.04.2025 | The Cybersecurity Battlefield: Navigating 2024's Threat Landscape | In the digital age, the stakes are high. Cybersecurity is no longer just a technical issue; it’s a matter of survival for organizations. The 2025 Mandiant M-Trends report paints a stark picture of the current threat landscape. Infostealer m... |
| 25.04.2025 | 5 Most Common Security Attack Methods in 2024: Mandiant’s M-Trends Report | Infostealer malware is on the rise, according to the 2025 cybersecurity M-Trends report from Mandiant. Unsecured data repositories and risky cloud migrations were also security weak points in 2024 for the organizations Mandiant surveyed in ... |
| 10.04.2025 | Why security stacks need to think like an attacker, and score every user in real time | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
More than 40% of corporate fraud is now AI-driven, designed to mimic real users, bypass traditional defenses and ... |
| 08.04.2025 | Traditional vulnerability assessment falls short on third-party risks | As organizations increasingly rely on third-party vendors, open-source components, and cloud services to bolster efficiency and scalability, they also open themselves to risks.
Historically they've relied on CVSS scores to measure the sever... |
| 24.03.2025 | From alerts to autonomy: How leading SOCs use AI copilots to fight signal overload and staffing shortfalls | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Thanks to the rapid advances in AI-powered security copilots, security operations centers (SOCs) are seeing false... |
| 19.03.2025 | Ransomware Top Predicted Cybersecurity Threat for 2025 | Ransomware is the top predicted cybersecurity threat for 2025, according to new research from enterprise software company Ivanti.
The finding, from the company’s 2025 State of Cybersecurity Report: Paradigm Shift, is especially concerning g... |
| 02.03.2025 | The Cybersecurity Landscape: A Race Against Time and Technology | In the digital age, cybersecurity is a battlefield. The stakes are high, and the threats are evolving. Recent reports from GreyNoise Intelligence reveal alarming trends in cyber vulnerabilities. The 2025 Mass Internet Exploitation Report pa... |
| 27.02.2025 | GreyNoise Intelligence Releases New Research, Raising Urgent Concerns About the Speed and Repetition of Cybersecurity Vulnerabilities | GreyNoise observes, analyzes, and labels data firsthand on Internet Protocol (IP) addresses that scan and attack the internet every day.
Provides key insights into attacker trends, exploited vulnerabilities and actionable defenses in its 20... |
| 21.02.2025 | The Cybersecurity Tightrope: Balancing AI Threats and Patch Management | In the digital age, cybersecurity is a high-stakes game. Organizations are caught in a relentless tug-of-war against adversaries who wield advanced tools and tactics. The landscape is shifting, and complacency is a luxury no one can afford.... |
| 20.02.2025 | Milliseconds to breach: How patch automation closes attackers’ fastest loophole | This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here.
Procrastinating about patching has killed more networks and damaged more compan... |
| 20.02.2025 | AI vs. endpoint attacks: What security leaders must know to stay ahead | This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here.
Enterprises run the very real risk of losing the AI arms race to adversaries wh... |
| 19.02.2025 | Darktrace: 96% of Phishing Attacks in 2024 Exploited Trusted Domains Including SharePoint & Zoom Docs | Threat actors are increasingly targeting trusted business platforms such as Dropbox, SharePoint, and QuickBooks in their phishing email campaigns and leveraging legitimate domains to bypass security measures, a new report released today has... |
| 14.02.2025 | Microsoft’s February Patch Tuesday: A Cybersecurity Wake-Up Call | February 2025 has arrived, and with it comes Microsoft’s monthly Patch Tuesday. This is the day when tech giants release crucial updates to protect users from lurking threats. This month, Microsoft has rolled out patches for two actively ex... |
| 12.02.2025 | Patch Tuesday: Microsoft Patches Two Actively Exploited Zero-Day Flaws | The monthly report is relatively lightweight, with some mobile updates or fixes that have already been performed server-side and shouldn’t be a concern to admins, said Tyler Reguly, associate director of security R&D at global cybersecu... |
| 31.01.2025 | Sarah Moloney Joins MikeWorldWide London as Managing Director | MikeWorldWide, one of the world’s leading independent public relations agencies has announced the appointment of Sarah Moloney as managing director of its UK and European operations. Moloney has over 20 years’ experience in growing and runn... |
| 31.01.2025 | Топ самых интересных CVE за январь 2025 года | ⚠ Внимание ⚠
Вся информация, представленная ниже, предназначена только для ознакомительных целей. Автор не несет ответственности за вред, который может быть причинен с помощью предоставленной им информации.
В этой подборке представлены самы... |
| 30.01.2025 | Navigating the Cybersecurity Battlefield: The Rise of AI-Powered Threats | In the digital age, the battlefield is no longer defined by borders or armies. It’s a realm of ones and zeros, where adversaries wield AI as their weapon of choice. The stakes are high, and the threats are evolving faster than ever. As we s... |
| 28.01.2025 | Outsmarting AI-powered cyber attacks: A 2025 playbook for real-time endpoint defense | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Adversaries are unleashing new tradecraft to exploit any weakness they can find in endpoints, relying on generati... |
| 13.01.2025 | Security Week 2503: атака zero-click на смартфоны Samsung | В конце прошлого года компания Samsung закрыла уязвимость, теоретически открывающую возможность проведения атаки на смартфоны компании без ведома пользователя. Недостаточный уровень контроля за входящим контентом в штатном мессенджере мог п... |
| 09.01.2025 | Ivanti discloses critical VPN vulnerability being actively targeted by hackers
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to pr... | Hackers are actively targeting deployments of some Ivanti Inc. software products using a newly discovered security vulnerability.
The company disclosed the exploit, which is tracked as CVE-2025-0282, on Wednesday.
Ivanti is a major provider... |
| 30.12.2024 | Forrester on cybersecurity budgeting: 2025 will be the year of CISO fiscal accountability | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
With 90% of cybersecurity and risk leaders predicting they’ll see budget increases in 2025, many are facing a new... |
| 17.12.2024 | The BadRAM Attack: A New Threat to AMD Processors | In the world of cybersecurity, new threats emerge like shadows in the night. The recent discovery of the BadRAM attack has sent ripples through the tech community, particularly targeting AMD processors. This sophisticated hardware attack ex... |
| 16.12.2024 | Security Week 2451: атака BadRAM на процессоры AMD | На прошлой неделе исследователи из университетов Бельгии, Германии и Великобритании продемонстрировали необычную аппаратную атаку, эксплуатирующую уязвимость в процессорах AMD. Хотя это и сложная атака, при некоторых условиях она может пред... |
| 10.12.2024 | The Rising Tide of Adversarial AI: How Security Operations Centers Can Survive the Storm | In the digital age, Security Operations Centers (SOCs) are the frontline defenders against a relentless tide of cyber threats. As adversarial AI attacks surge, SOCs find themselves in a precarious position. The statistics are alarming: 77% ... |
| 10.12.2024 | Rising cybercrime in Australia prompts better cyber hygiene | Rising cybercrime rates in Australia, with incidents occurring approximately every six minutes, are driving organisations to adopt enhanced cyber hygiene practices to mitigate threats and financial impacts.
The Australian Signals Directorat... |
| 09.12.2024 | Defending SOCs Under Siege: Battling Adversarial AI Attacks | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
With 77% of enterprises already victimized by adversarial AI attacks and eCrime actors achieving a record breakou... |
| 04.12.2024 | Report: 90% of Security Pros See GenAI as a Benefit, and a Threat | The majority of security professionals believe that genAI will benefit their own security teams as much as, if not more than, it benefits threat actors, according to the latest research from Ivanti.
In a new report, Gen AI and Cybersecurity... |
| 21.11.2024 | MITRE опубликовала список 25 самых опасных уязвимостей 2024 года | MITRE представила список 25 самых распространённых и опасных уязвимостей программного обеспечения этого года. Всего было обнаружено более 31 тысячи уязвимостей в период с июня 2023 года по июнь 2024-го.
Под уязвимостями программного обеспеч... |
| 20.11.2024 | Navigating the AI Storm: The Cybersecurity and Workforce Challenges Ahead | The digital landscape is shifting. As we approach 2025, two critical challenges loom large: the rise of AI-driven cyber threats and a significant workforce shortage in U.S. manufacturing. Both issues are interconnected, creating a perfect s... |
| 14.11.2024 | Securing the AI frontier: Protecting enterprise systems against AI-driven threats | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
By 2025, weaponized AI attacks targeting identities—unseen and often the most costly to recover from—will pose th... |
| 08.11.2024 | Top Vulnerability Management Tools: Reviews & Comparisons 2024 | Best overall: Tenable Vulnerability ManagementBest for SMEs: ESET Vulnerability and Patch ManagementBest for patch management: Syxsense EnterpriseBest cybersecurity suite incorporating vulnerability management: CrowdStrike Exposure Manageme... |
| 08.11.2024 | Identity management in 2025: 4 ways security teams can address gaps and risks | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
While 99% of businesses plan to invest more in security, only 52% have fully implemented multi-factor authenticat... |
| 01.11.2024 | API на передовой: методы противостояния кибератакам | Гайнуллина Екатерина, Security Vision
Введение
В последние годы значение безопасности API значительно возросло. С увеличением использования API и резким ростом их трафика, поверхность атаки расширилась, что сделало API одной из главных целе... |
| 28.10.2024 | The Double-Edged Sword of GenAI in the Life Sciences Sector | Rob Juncker, CTO of Code42 (now part of Mimecast)
It’s said that data is the lifeblood of the modern enterprise. While that’s certainly true, it’s also true that there is perhaps no industry as dependent on data – and protecting it – as the... |
| 04.10.2024 | Research shows workplace AI use outpaces security measures | Recent research conducted by Ivanti has highlighted a significant gap between the rise in the use of generative artificial intelligence (Gen AI) in the workplace and the preparedness of security teams to mitigate associated risks. The repor... |
| 03.10.2024 | GPT-4o: OpenAI’s shield against $40B deepfake threat to enterprises | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Deepfake incidents are surging in 2024, predicted to increase by 60% or more this year, pushing global cases to 1... |
| 30.09.2024 | Топ-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — применение EDRKillShifter для обхода EDR и антивирусной защиты, использование кода Kryptina Linux-вымогателем Mallox, критическая уязвимость в Ivanti Virtual Traffic Manager, исправление 11 уязвимостей Cisco, эволюция груп... |
| 24.09.2024 | With 23andMe in crisis, strengthening DNA security has never been more urgent | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
With all seven independent directors resigning from 23andMe last week, the company has become a cautionary tale o... |
| 17.09.2024 | Microsoft Fixes Crashes in 365 Apps Amid New Data Exfiltration Threats | In the digital landscape, stability is paramount. Microsoft recently addressed a significant issue that plagued its Microsoft 365 applications. Users of Outlook, Word, Excel, PowerPoint, and OneNote faced unexpected crashes during routine t... |
| 17.09.2024 | Security Week 2438: эксфильтрация данных через свист конденсаторов | Седьмого сентября исследователь Мордехай Гури опубликовал новую работу, предложив атаку PIXHELL — очередной метод эксфильтрации данных из компьютера, изолированного от Интернета и локальной сети. Гури — известный специалист по решению задач... |
| 16.09.2024 | The Future of Hiring: AI and Collaboration in Talent Acquisition | In the fast-paced world of talent acquisition, the stakes are high. Companies need the right people to thrive. Enter Findem and HireBrain, two innovators shaking up the hiring landscape. Their recent partnership promises to redefine how org... |
| 12.09.2024 | Findem and HireBrain Partner to Help Companies Hire with Unmatched Predictability and Precision | Findem and HireBrain Partner
The first simple and automated way to move from intake to job description to candidate search and engagement
SAN FRANCISCO, Sept. 12, 2024 /PRNewswire-PRWeb/ -- Findem, the only AI talent acquisition and managem... |
| 02.09.2024 | Published Vulnerabilities Surge by 43% in H1 2024 | A new report from Forescout reveals that published vulnerabilities increased by 43% in the first half of 2024 compared to the same period in 2023, with attackers frequently exploiting flaws in virtual private networks (VPNs) and other perim... |
| 29.08.2024 | Navigating the Cybersecurity Landscape: The Role of AI and Human Collaboration | In the ever-evolving world of cybersecurity, the stakes are high. Organizations face a relentless barrage of threats. Traditional security measures are crumbling under the weight of sophisticated attacks. Enter AI-driven cybersecurity. This... |
| 29.08.2024 | The Cybersecurity Tightrope: Balancing Risks and Responses in a Digital Age | In the digital landscape, cybersecurity is a high-wire act. One misstep can lead to catastrophic falls. Companies are grappling with a growing number of cyber threats, and the stakes have never been higher. As organizations rush to patch vu... |
| 26.08.2024 | New Emotional Footprint Report From Info-Tech Research Group Names the Top IT Service Management Providers for Boosting Cost Efficiency and Risk Management in 2024 | Based on SoftwareReviews data, the 2024 IT Service Management Emotional Footprint Report from Info-Tech Research Group showcases the leading tools that are equipping organizations with advanced decision-making capabilities to adeptly naviga... |
| 26.08.2024 | How AI is helping cut the risks of breaches with patch management | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
When it comes to patching endpoints, systems and sensors across an enterprise, complacency kills.
For many IT and... |
| 20.08.2024 | TuxCare’s KernelCare Enterprise Featured on Ivanti Marketplace | TuxCare PALO ALTO, CALIF., USA, August 20, 2024 /EINPresswire.com/ -- TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced that KernelCare Enterprise is now a featured solution on the Ivanti Marketplace.
... |
| 17.08.2024 | Microsoft’s Patch Tuesday: A Cybersecurity Wake-Up Call | In the ever-evolving landscape of cybersecurity, Microsoft’s latest Patch Tuesday update serves as a stark reminder of the vulnerabilities lurking in our digital world. This month, the tech giant addressed a staggering 88 vulnerabilities, i... |
| 15.08.2024 | Record Number of Girls Taking Computing A-Level | While the number of girls taking computing A-level in 2024 increased year on year to over 3,000 students, computing science still hasn’t cracked the top ten list of A-level courses taken in England and Wales.
Computing science uptake among ... |
| 15.08.2024 | Microsoft tackles 88 vulnerabilities in latest Patch Tuesday update | This month’s Patch Tuesday has seen Microsoft address a substantial number of vulnerabilities, as disclosed by various experts in the field.
Security researchers have highlighted seven critical and ten zero-day vulnerabilities among the 88 ... |
| 06.08.2024 | Verizon's Dual Role: Safeguarding Communication and Combating Cyber Threats | In a world where communication is the lifeblood of emergency response and security, Verizon has cemented its role as a guardian. Recently, the Department of Homeland Security (DHS) renewed a decade-long contract with Verizon Business, value... |
| 06.08.2024 | Verizon reveals escalating risks in mobile and IoT security | 80% of responding organizations consider mobile devices critical to their operations, while 95% are actively using IoT devices
96% of critical infrastructure respondents use IoT devices, with % having experienced a significant mobile or IoT... |
| 06.08.2024 | Darktrace Half-Year Threat Report 2024 Reveals Persistent Cybercrime-as-a-Service Threats Amidst Evolving Attack Landscape | Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) continue to dominate the threat landscape
Email phishing remains a top threat, with 17.8 million phishing emails detected between December 2023 and July 2024, and 62% bypassing ... |
| 31.07.2024 | Five takeaways from Forrester’s 2024 state of application security | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Application security often gets sacrificed for speed and to meet ever-tightening time-to-market windows for new a... |
| 18.07.2024 | How AI is closing identity and endpoint gaps that attackers exploit | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Endpoints are among the weakest yet most valuable attack vectors, and with more companies pursuing AI development... |
| 16.07.2024 | Are Non-IT Leaders Overconfident in Cybersecurity Capabilities? | Tech company Ivanti has released its latest research report on Aligning Perspectives: Cyber Risk Management in the C‑Suite, which details the need for CISOs to effectively communicate risk up the chain of command.
Cyber-threats are advancin... |
| 11.07.2024 | ICL Services и GreenData импортозаместят ESM по стандартам ITIL | Продуктово-сервисная компания ICL Services заключила партнерское соглашение с российскими ИТ-компаниями GreenData и Cleverics. В рамках сотрудничества ICL Services будет развертывать разработанное компаниями решение, ITSM/ESM-систему Altevi... |
| 01.07.2024 | Deepfakes will cost $40 billion by 2027 as adversarial AI gains momentum | Don’t miss OpenAI, Chevron, Nvidia, Kaiser Permanente, and Capital One leaders only at VentureBeat Transform 2024. Gain essential insights about GenAI and expand your network at this exclusive three day event. Learn More
Now one of the fast... |
| 07.06.2024 | Snowflake’s customer breaches make 2024 the year of the identity siege | VB Transform 2024 returns this July! Over 400 enterprise leaders will gather in San Francisco from July 9-11 to dive into the advancement of GenAI strategies and engaging in thought-provoking discussions within the community. Find out how y... |
| 07.06.2024 | How AI-driven identity attacks are defining the new threatscape | VB Transform 2024 returns this July! Over 400 enterprise leaders will gather in San Francisco from July 9-11 to dive into the advancement of GenAI strategies and engaging in thought-provoking discussions within the community. Find out how y... |
| 27.05.2024 | Is Your Organisational IT and Security Data Siloed? | Security tech firm Ivanti has released the results of its 2024 State of Cybersecurity Report. With the increasing complexity of the threats and evolution of threat-actor tactics, cybersecurity professionals are facing a constant battle to k... |
| 23.05.2024 | IT and security data is siloed in most organizations | Although the goals and challenges of IT and security professionals overlap, 72 percent of respondents to a new survey report that security data and IT data are siloed in their organization, contributing to elevated security risk.
The survey... |
| 14.05.2024 | Security Week 2420: эксплуатация уязвимостей в ПО | 7 мая исследователи «Лаборатории Касперского» опубликовали отчет со статистикой по обнаружению и эксплуатации уязвимостей в ПО. В публикации приводятся цифры за первый квартал 2024 года, по ряду параметров они сравниваются с данными с начал... |
| 10.05.2024 | Cisco reimagines cybersecurity at RSAC 2024 with AI and kernel-level visibility | Join us in returning to NYC on June 5th to collaborate with executive leaders in exploring comprehensive methods for auditing AI models regarding bias, performance, and ethical compliance across diverse organizations. Find out how you can a... |
| 09.05.2024 | Axios Event: Big Tech companies sign CISA pledge to improve security practices | figcaption>span]:font-sans">
SAN FRANCISCO – A cohort of the largest tech companies have pledged to implement and adhere to increased "secure-by-design" principles laid out by CISA as part of a new security pledge.
Why ... |
| 29.04.2024 | Forrester’s top 5 cybersecurity threats for 2024: Weaponized AI is the new normal | Discover how companies are responsibly integrating AI in production. This invite-only event in SF will explore the intersection of technology and business. Find out how you can attend here.
Weaponizing AI is proving to be a potent catalyst ... |