report

Your SOC is tired, AI isn’t

Your SOC is tired, AI isn’t 2025-10-10 at 07:39 By Anamarija Pogorelec Security teams have discussed AI in the SOC for years, but solid evidence of its impact has been limited. A recent benchmark study by Dropzone puts measurable evidence behind the idea, showing that AI agents can help analysts work faster and with greater […]

React to this headline:

Loading spinner

Your SOC is tired, AI isn’t Read More »

Six metrics policymakers need to track cyber resilience

Six metrics policymakers need to track cyber resilience 2025-10-09 at 07:48 By Anamarija Pogorelec Most countries are still making national cyber policy decisions without reliable numbers. Regulations often focus on incident reporting after damage is done, but they fail to give governments a forward-looking picture of resilience. A new report from Zurich Insurance Group argues

React to this headline:

Loading spinner

Six metrics policymakers need to track cyber resilience Read More »

Cybersecurity’s next test: AI, quantum, and geopolitics

Cybersecurity’s next test: AI, quantum, and geopolitics 2025-10-07 at 14:03 By Anamarija Pogorelec Geopolitics, emerging technology, and skills shortages are reshaping cybersecurity priorities across industries, according to a new PwC report. The findings show a mix of rising awareness, persistent weaknesses, and uneven preparation for the next wave of threats. Geopolitical risk at the core

React to this headline:

Loading spinner

Cybersecurity’s next test: AI, quantum, and geopolitics Read More »

Old authentication habits die hard

Old authentication habits die hard 2025-10-06 at 07:48 By Anamarija Pogorelec Many organizations still rely on weak authentication methods while workers’ personal habits create additional risks, according to Yubico. Training and policy gaps 40% of employees said they have never received cybersecurity training. Even among those who have, the guidance is often outdated because many

React to this headline:

Loading spinner

Old authentication habits die hard Read More »

Phishing is old, but AI just gave it new life

Phishing is old, but AI just gave it new life 2025-10-06 at 07:03 By Anamarija Pogorelec The volume of cyberattacks has reached staggering levels, with new tactics that blur the line between legitimate and malicious activity. A new threat report from Comcast, based on 34.6 billion cybersecurity events analyzed over the past year, shows what

React to this headline:

Loading spinner

Phishing is old, but AI just gave it new life Read More »

Passkeys rise, but scams still hit hard in 2025

Passkeys rise, but scams still hit hard in 2025 2025-10-03 at 08:34 By Anamarija Pogorelec Americans are dealing with a growing wave of digital scams, and many are losing money in the process. According to the fourth annual Consumer Cyber Readiness Report, nearly half of U.S. adults have been targeted by cyberattacks or scams, and

React to this headline:

Loading spinner

Passkeys rise, but scams still hit hard in 2025 Read More »

AI hype hits a wall when the data doesn’t deliver

AI hype hits a wall when the data doesn’t deliver 2025-10-03 at 07:31 By Anamarija Pogorelec Companies are pouring money into AI for IT operations, but most projects are still far from maturity. A global survey of 1,200 business leaders, IT leaders, and technical specialists found that while spending and confidence are rising, only 12%

React to this headline:

Loading spinner

AI hype hits a wall when the data doesn’t deliver Read More »

Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency

Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency 2025-10-02 at 17:23 By Eduard Kovacs ENISA has published its 2025 Threat Landscape report, highlighting some of the attacks aimed at OT systems. The post Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency Read More »

Biotech platforms keep missing the mark on security fundamentals

Biotech platforms keep missing the mark on security fundamentals 2025-10-02 at 08:27 By Anamarija Pogorelec A new security posture report on the biotech sector shows how quickly attackers could reach sensitive health data with only basic reconnaissance. Researchers needed less than two hours per company to uncover exposed genomic records, unprotected APIs, and misconfigured systems,

React to this headline:

Loading spinner

Biotech platforms keep missing the mark on security fundamentals Read More »

Cybersecurity leaders underreport cyber incidents to executives

Cybersecurity leaders underreport cyber incidents to executives 2025-09-29 at 08:04 By Anamarija Pogorelec Cyberattacks are becoming more frequent and severe, with 71% of surveyed security leaders saying attacks have grown more common in the past year and 61% reporting greater impact when incidents occur, according to a new report from VikingCloud. Nation-state attacks move to

React to this headline:

Loading spinner

Cybersecurity leaders underreport cyber incidents to executives Read More »

Top 10 fastest growing ICT jobs

Top 10 fastest growing ICT jobs 2025-09-29 at 08:04 By Anamarija Pogorelec AI is reshaping the workforce in ways that security leaders cannot ignore. The AI Workforce Consortium’s new report, ICT in Motion: The Next Wave of AI Integration, provides a look at how AI is changing job roles and skills across G7 economies. The

React to this headline:

Loading spinner

Top 10 fastest growing ICT jobs Read More »

Ransomware groups are multiplying, raising the stakes for defenders

Ransomware groups are multiplying, raising the stakes for defenders 2025-09-26 at 09:08 By Sinisa Markovic Ransomware activity is climbing again, with a steep increase in the number of victims and the number of groups launching attacks. A new mid-year report from Searchlight Cyber shows how quickly the threat landscape is shifting and why CISOs need

React to this headline:

Loading spinner

Ransomware groups are multiplying, raising the stakes for defenders Read More »

GenAI is exposing sensitive data at scale

GenAI is exposing sensitive data at scale 2025-09-25 at 07:46 By Anamarija Pogorelec Sensitive data is everywhere and growing fast. A new report from Concentric AI highlights how unstructured data, duplicate files, and risky sharing practices are creating serious problems for security teams. The findings show how generative AI tools like Microsoft Copilot are adding

React to this headline:

Loading spinner

GenAI is exposing sensitive data at scale Read More »

AI is rewriting the rules of cyber defense

AI is rewriting the rules of cyber defense 2025-09-25 at 07:01 By Anamarija Pogorelec Enterprise security teams are underprepared to detect new, adaptive AI-powered threats. The study, published by Lenovo, surveyed 600 IT leaders across major markets and shows widespread concern about external and internal risks, along with low confidence in current defenses. External AI

React to this headline:

Loading spinner

AI is rewriting the rules of cyber defense Read More »

APIs and hardware are under attack, and the numbers don’t look good

APIs and hardware are under attack, and the numbers don’t look good 2025-09-24 at 08:35 By Sinisa Markovic Attackers have a new favorite playground, and it’s not where many security teams are looking. According to fresh data from Bugcrowd, vulnerabilities in hardware and APIs are climbing fast, even as website flaws hold steady. The shift

React to this headline:

Loading spinner

APIs and hardware are under attack, and the numbers don’t look good Read More »

A look inside 1,000 cyber range events and what they reveal about AppSec

A look inside 1,000 cyber range events and what they reveal about AppSec 2025-09-24 at 07:45 By Anamarija Pogorelec Software powers almost every part of business, which means attackers have more chances than ever to exploit insecure code. A new report from CMD+CTRL Security looks at how teams are building their defenses through cyber range

React to this headline:

Loading spinner

A look inside 1,000 cyber range events and what they reveal about AppSec Read More »

Gartner: Preemptive cybersecurity to dominate 50% of security spend by 2030

Gartner: Preemptive cybersecurity to dominate 50% of security spend by 2030 2025-09-23 at 08:09 By Help Net Security By 2030, preemptive cybersecurity solutions will account for 50% of IT security spending, up from less than 5% in 2024, replacing standalone detection and response (DR) solutions as the preferred approach to defend against cyberthreats, according to

React to this headline:

Loading spinner

Gartner: Preemptive cybersecurity to dominate 50% of security spend by 2030 Read More »

High-impact IT outages cost businesses $2 million per hour

High-impact IT outages cost businesses $2 million per hour 2025-09-23 at 08:09 By Anamarija Pogorelec The financial stakes of downtime are climbing, and IT leaders are being pushed to rethink how they monitor complex systems. According to the 2025 Observability Forecast from New Relic, the median cost of a high-impact outage has reached $2 million

React to this headline:

Loading spinner

High-impact IT outages cost businesses $2 million per hour Read More »

Kubernetes matures as AI and GitOps reshape operations

Kubernetes matures as AI and GitOps reshape operations 2025-09-22 at 08:09 By Anamarija Pogorelec Kubernetes has moved well past its early adoption phase. The new Komodor 2025 Enterprise Kubernetes Report shows that technical teams are shifting their focus from running containers to managing a growing mix of AI workloads and advanced automation practices like GitOps.

React to this headline:

Loading spinner

Kubernetes matures as AI and GitOps reshape operations Read More »

Shifting supply chains and rules test CPS security strategies

Shifting supply chains and rules test CPS security strategies 2025-09-19 at 08:31 By Sinisa Markovic Cyber-physical systems are getting harder to protect as the business landscape keeps shifting. Economic pressures, supply chain changes, and new regulations are creating more openings for attackers while complicating how organizations manage security. A new report from Claroty, based on

React to this headline:

Loading spinner

Shifting supply chains and rules test CPS security strategies Read More »

Scroll to Top