 
																		Personhood: Cybersecurity’s next great authentication battle as AI improves
CISOs may be intimately familiar with the dozens of forms of authentication for privileged areas of […]
 
																		Cybersecurity vet Madison Horn makes her bid for US Congress
It’s safe to say that Madison Horn is the only candidate for US Congress in history […]
 
																		Microsoft fixes Authenticator design flaw after eight years overwriting accounts
Having ignored user complaints about a security design flaw within Microsoft Authenticator for eight years, Microsoft […]
 
																		Warning to ServiceNow admins: Block publicly available KB articles
Many organizations using ServiceNow are inadvertently exposing sensitive personal and corporate data through misconfigured Knowledge Base […]
 
																		Navigating the future of OT security
Operational technology (OT) infrastructure is facing an unprecedented wave of cyberattacks, with a reported 73% surge […]
 
																		Microsoft re-categorizes fixed Trident bug as zero day
A recently patched Windows MSHTML (Trident) Platform Spoofing Vulnerability had zero day exploitations since before July […]
 
																		European digital identity: this is how the EU’s big bet is evolving
Imagine you’ve just arrived at your vacation destination. You have to pick up the rental car […]
 
																		Ransomware whistleblower: Columbus could have avoided its mistakes
A ransomware attack on Columbus, Ohio, has drawn international attention and condemnation for how city leaders […]
 
																		Will potential security gaps derail Microsoft’s Copilot?
Microsoft has bet big on Copilot, the generative AI (genAI) assistant it’s integrating into nearly its […]
 
																		AI-SPM buyer’s guide: 9 security posture management tools to protect your AI infrastructure
Widespread adoption of generative AI across businesses has increased the need for contingencies, including AI security […]
