CISO

LLMs can boost cybersecurity decisions, but not for everyone

LLMs can boost cybersecurity decisions, but not for everyone 2025-09-19 at 09:11 By Mirko Zorz LLMs are moving fast from experimentation to daily use in cybersecurity. Teams are starting to use them to sort through threat intelligence, guide incident response, and help analysts handle repetitive work. But adding AI into the decision-making process brings new […]

React to this headline:

Loading spinner

LLMs can boost cybersecurity decisions, but not for everyone Read More »

Shifting supply chains and rules test CPS security strategies

Shifting supply chains and rules test CPS security strategies 2025-09-19 at 08:31 By Sinisa Markovic Cyber-physical systems are getting harder to protect as the business landscape keeps shifting. Economic pressures, supply chain changes, and new regulations are creating more openings for attackers while complicating how organizations manage security. A new report from Claroty, based on

React to this headline:

Loading spinner

Shifting supply chains and rules test CPS security strategies Read More »

Attackers are coming for drug formulas and patient data

Attackers are coming for drug formulas and patient data 2025-09-12 at 08:18 By Sinisa Markovic In the pharmaceutical industry, clinical trial data, patient records, and proprietary drug formulas are prime targets for cybercriminals. These high-value assets make the sector a constant focus for attacks. Disruptions to research or medicine distribution can have life-threatening consequences. “During

React to this headline:

Loading spinner

Attackers are coming for drug formulas and patient data Read More »

Ransomware, vendor outages, and AI attacks are hitting harder in 2025

Ransomware, vendor outages, and AI attacks are hitting harder in 2025 2025-09-12 at 07:57 By Mirko Zorz Ransomware, third-party disruptions, and the rise of AI-powered attacks are reshaping the cyber risk landscape in 2025. A new midyear analysis from Resilience shows how these forces are playing out in real-world incidents and how they are changing

React to this headline:

Loading spinner

Ransomware, vendor outages, and AI attacks are hitting harder in 2025 Read More »

AI is everywhere, but scaling it is another story

AI is everywhere, but scaling it is another story 2025-09-11 at 08:02 By Anamarija Pogorelec AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say orchestration is the key to scaling AI. They point to governance, visibility, and collaboration as the critical areas executives need

React to this headline:

Loading spinner

AI is everywhere, but scaling it is another story Read More »

CISOs, stop chasing vulnerabilities and start managing human risk

CISOs, stop chasing vulnerabilities and start managing human risk 2025-09-10 at 07:25 By Anamarija Pogorelec Breaches continue to grow in scale and speed, yet the weakest point remains unchanged: people. According to Dune Security’s 2025 CISO Risk Intelligence Survey, over 90 percent of incidents still originate from user behavior rather than technical flaws. The survey

React to this headline:

Loading spinner

CISOs, stop chasing vulnerabilities and start managing human risk Read More »

Employees keep feeding AI tools secrets they can’t take back

Employees keep feeding AI tools secrets they can’t take back 2025-09-09 at 08:03 By Anamarija Pogorelec Employees are putting sensitive data into public AI tools, and many organizations don’t have the controls to stop it. A new report from Kiteworks finds that most companies are missing basic safeguards to manage this data. Security control maturity

React to this headline:

Loading spinner

Employees keep feeding AI tools secrets they can’t take back Read More »

Identity management was hard, AI made it harder

Identity management was hard, AI made it harder 2025-09-08 at 07:33 By Anamarija Pogorelec Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven identities and machine accounts grow, most security teams are not prepared to manage them at scale.

React to this headline:

Loading spinner

Identity management was hard, AI made it harder Read More »

Smart ways CISOs can do more with less

Smart ways CISOs can do more with less 2025-09-05 at 08:05 By Help Net Security In this Help Net Security video, Jill Knesek, CISO at BlackLine, shares practical strategies for CISOs navigating tighter budgets. From maximizing existing tools and vendor partnerships to leveraging AI and making smart investments, she offers actionable advice for maintaining strong

React to this headline:

Loading spinner

Smart ways CISOs can do more with less Read More »

KillChainGraph: Researchers test machine learning framework for mapping attacker behavior

KillChainGraph: Researchers test machine learning framework for mapping attacker behavior 2025-09-01 at 09:21 By Mirko Zorz A team of researchers from Frondeur Labs, DistributedApps.ai, and OWASP has developed a new machine learning framework designed to help defenders anticipate attacker behavior across the stages of the Cyber Kill Chain. The work explores how machine learning models

React to this headline:

Loading spinner

KillChainGraph: Researchers test machine learning framework for mapping attacker behavior Read More »

Boards are being told to rethink their role in cybersecurity

Boards are being told to rethink their role in cybersecurity 2025-09-01 at 08:03 By Sinisa Markovic Boards of directors are being told that cybersecurity is now central to business resilience and growth, and that they must engage more directly in the way their organizations manage risk. A new report from Google Cloud’s Office of the

React to this headline:

Loading spinner

Boards are being told to rethink their role in cybersecurity Read More »

GenAI is fueling smarter fraud, but broken teamwork is the real problem

GenAI is fueling smarter fraud, but broken teamwork is the real problem 2025-09-01 at 08:03 By Anamarija Pogorelec More than 80 percent of large U.S. companies were targeted by socially engineered fraud in the past year, according to Trustmi’s 2025 Socially Engineered Fraud & Risk Report. Nearly half of those organizations reported a direct financial

React to this headline:

Loading spinner

GenAI is fueling smarter fraud, but broken teamwork is the real problem Read More »

Finding connection and resilience as a CISO

Finding connection and resilience as a CISO 2025-08-29 at 10:03 By Mirko Zorz With sensitive information to protect and reputational risk always in the background, it isn’t easy for security leaders to have open conversations about what’s working and what isn’t. Yet strong peer networks and candid exchanges are critical for resilience, both organizationally and

React to this headline:

Loading spinner

Finding connection and resilience as a CISO Read More »

ScamAgent shows how AI could power the next wave of scam calls

ScamAgent shows how AI could power the next wave of scam calls 2025-08-28 at 09:03 By Mirko Zorz Scam calls have long been a problem for consumers and enterprises, but a new study suggests they may soon get an upgrade. Instead of a human scammer on the other end of the line, future calls could

React to this headline:

Loading spinner

ScamAgent shows how AI could power the next wave of scam calls Read More »

Can AI make threat intelligence easier? One platform thinks so

Can AI make threat intelligence easier? One platform thinks so 2025-08-28 at 07:38 By Mirko Zorz When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t sustainable. They were manually tracking blogs, RSS feeds, and social media channels, but it took too long to separate

React to this headline:

Loading spinner

Can AI make threat intelligence easier? One platform thinks so Read More »

How CISOs are balancing risk, pressure and board expectations

How CISOs are balancing risk, pressure and board expectations 2025-08-28 at 07:05 By Sinisa Markovic AI has moved to the top of the CISO agenda. Three in five CISOs see generative AI as a security risk, with many worried about sensitive data leaking through public tools. At the same time, most organizations are not blocking

React to this headline:

Loading spinner

How CISOs are balancing risk, pressure and board expectations Read More »

AI Security Map: Linking AI vulnerabilities to real-world impact

AI Security Map: Linking AI vulnerabilities to real-world impact 2025-08-27 at 09:40 By Mirko Zorz A single prompt injection in a customer-facing chatbot can leak sensitive data, damage trust, and draw regulatory scrutiny in hours. The technical breach is only the first step. The real risk comes from how quickly one weakness in an AI

React to this headline:

Loading spinner

AI Security Map: Linking AI vulnerabilities to real-world impact Read More »

How compliance teams can turn AI risk into opportunity

How compliance teams can turn AI risk into opportunity 2025-08-27 at 08:52 By Mirko Zorz AI is moving faster than regulation, and that creates opportunities and risks for compliance teams. While governments work on new rules, businesses cannot sit back and wait. In this Help Net Security video, Matt Hillary, CISO at Drata, look at

React to this headline:

Loading spinner

How compliance teams can turn AI risk into opportunity Read More »

What CISOs can learn from Doppel’s new AI-driven social engineering simulation

What CISOs can learn from Doppel’s new AI-driven social engineering simulation 2025-08-27 at 07:51 By Sinisa Markovic Doppel has introduced a new product called Doppel Simulation, which expands its platform for defending against social engineering. The tool uses autonomous AI agents to create multi-channel simulations that mirror how attackers operate across email, SMS, messaging apps,

React to this headline:

Loading spinner

What CISOs can learn from Doppel’s new AI-driven social engineering simulation Read More »

Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO

Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO 2025-08-26 at 09:24 By Mirko Zorz Agriculture is a connected, software-driven industry where cybersecurity is just as essential as tractors and harvesters. From embedded hardware in smart fleets to defending against advanced persistent threats, protecting the agricultural supply chain requires a layered, collaborative approach.

React to this headline:

Loading spinner

Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO Read More »

Scroll to Top