Don't let mistakes bother you

If you don't care, you may become a victim of spam

US Appeals Court lowers burden of proof for data breach lawsuits

An October decision of the 4th US Circuit Court of Appeals in Virginia has — yet […]

What does aligning security to the business really mean?

As part of his company’s AI center of excellence, Tim Sattler works to identify where and […]

Cyber agencies produce ‘long overdue’ best practices for securing Microsoft Exchange Server

Cyber agencies from three countries including the US have issued a list of security best practices […]

Chinese hackers target Western diplomats using hard-to-patch Windows shortcut flaw

Chinese hackers have been spotted targeting European diplomats using a longstanding Windows shortcut vulnerability that’s been […]

Claude AI vulnerability exposes enterprise data through code interpreter exploit

A newly disclosed vulnerability in Anthropic’s Claude AI assistant has revealed how attackers can weaponize the […]

OpenAI launches Aardvark to detect and patch hidden bugs in code

OpenAI has unveiled Aardvark, a GPT-5-powered autonomous agent designed to act like a human security researcher […]

The unified linkage model: A new lens for understanding cyber risk

When Okta’s support credentials were stolen in 2023, the breach didn’t stop at the identity provider. […]

Bug-Bounty-Programm trifft KI – ein zweischneidiges Schwert

KI-gestütztes Bug Hunting verspricht viele Vorteile. Ob sich diese auch in der Praxis verwirklichen, ist eine […]

Agentic AI: What now, what next?

Download the November 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]

Aembit Introduces Identity and Access Management for Agentic AI

Aembit today announced the launch of Aembit Identity and Access Management (IAM) for Agentic AI, a […]

1 2 3 270