report

AI can’t deliver without trusted, well-governed information

AI can’t deliver without trusted, well-governed information 2025-08-29 at 10:03 By Sinisa Markovic While enterprise IT leaders recognize the transformative potential of AI, a gap in information readiness is causing their organizations to struggle in securing, governing, and aligning AI initiatives across business, according to a survey conducted by the Ponemon Institute. Who is the […]

React to this headline:

Loading spinner

AI can’t deliver without trusted, well-governed information Read More »

How CISOs are balancing risk, pressure and board expectations

How CISOs are balancing risk, pressure and board expectations 2025-08-28 at 07:05 By Sinisa Markovic AI has moved to the top of the CISO agenda. Three in five CISOs see generative AI as a security risk, with many worried about sensitive data leaking through public tools. At the same time, most organizations are not blocking

React to this headline:

Loading spinner

How CISOs are balancing risk, pressure and board expectations Read More »

AI is becoming a core tool in cybercrime, Anthropic warns

AI is becoming a core tool in cybercrime, Anthropic warns 2025-08-27 at 17:32 By Anamarija Pogorelec A new report from Anthropic shows how criminals are using AI to actively run parts of their operations. The findings suggest that AI is now embedded across the full attack cycle, from reconnaissance and malware development to fraud and

React to this headline:

Loading spinner

AI is becoming a core tool in cybercrime, Anthropic warns Read More »

Social media apps that aggressively harvest user data

Social media apps that aggressively harvest user data 2025-08-27 at 07:10 By Sinisa Markovic Both domestic and foreign technology companies collect vast amounts of Americans’ personal data through mobile applications, according to Incogni. Some apps leverage data for marketing and advertising purposes, feeding algorithms to calculate optimal prices based on consumer behavior, often leading to

React to this headline:

Loading spinner

Social media apps that aggressively harvest user data Read More »

Smart manufacturing demands workers with AI and cybersecurity skills

Smart manufacturing demands workers with AI and cybersecurity skills 2025-08-25 at 07:13 By Sinisa Markovic The manufacturing sector is entering a new phase of digital transformation. According to Rockwell Automation’s 10th Annual State of Smart Manufacturing Report, 56% of manufacturers are piloting smart manufacturing initiatives, 20% have deployed them at scale, and another 20% are

React to this headline:

Loading spinner

Smart manufacturing demands workers with AI and cybersecurity skills Read More »

AI gives ransomware gangs a deadly upgrade

AI gives ransomware gangs a deadly upgrade 2025-08-22 at 09:00 By Sinisa Markovic Ransomware continues to be the major threat to large and medium-sized businesses, with numerous ransomware gangs abusing AI for automation, according to Acronis. Ransomware gangs maintain pressure on victims From January to June 2025, the number of publicly reported ransomware victims jumped

React to this headline:

Loading spinner

AI gives ransomware gangs a deadly upgrade Read More »

The new battleground for CISOs is human behavior

The new battleground for CISOs is human behavior 2025-08-22 at 08:40 By Anamarija Pogorelec Attackers don’t always need a technical flaw. More often, they just trick your people. Social engineering works, and AI makes it harder to catch.” Only about one in four cybersecurity teams are effective at collaborating with the broader business (Source: LevelBlue)

React to this headline:

Loading spinner

The new battleground for CISOs is human behavior Read More »

Local governments struggle to defend critical infrastructure as threats grow

Local governments struggle to defend critical infrastructure as threats grow 2025-08-22 at 08:03 By Sinisa Markovic A small-town water system, a county hospital, and a local school district may not seem like front-line targets in global conflict, but they are. These organizations face daily cyber attacks, from ransomware to foreign adversaries probing for weak points.

React to this headline:

Loading spinner

Local governments struggle to defend critical infrastructure as threats grow Read More »

URL-based threats become a go-to tactic for cybercriminals

URL-based threats become a go-to tactic for cybercriminals 2025-08-21 at 07:34 By Help Net Security Cybercriminals are using advanced social engineering and AI-generated content to make malicious URLs difficult for users to identify, according to Proofpoint. Whether through email, text messages, or collaboration apps, URL-based threats now dominate the cyber threat landscape. Attackers are not

React to this headline:

Loading spinner

URL-based threats become a go-to tactic for cybercriminals Read More »

CISOs need to think about risks before rushing into AI

CISOs need to think about risks before rushing into AI 2025-08-21 at 07:02 By Anamarija Pogorelec Organizations are increasing investments in cloud, AI, and emerging technologies, but their infrastructure and security strategies often lag behind. A recent Unisys survey of 1,000 senior executives shows that business and IT leaders are not always aligned on what

React to this headline:

Loading spinner

CISOs need to think about risks before rushing into AI Read More »

Why CISOs in business services must close the edge security gap

Why CISOs in business services must close the edge security gap 2025-08-20 at 07:31 By Anamarija Pogorelec Cloud adoption is speeding ahead in the business services sector, but security for remote and edge environments is falling behind. At the same time, generative AI is moving into daily workflows faster than most IT teams are prepared

React to this headline:

Loading spinner

Why CISOs in business services must close the edge security gap Read More »

Weak alerting and slipping prevention raise risk levels for CISOs

Weak alerting and slipping prevention raise risk levels for CISOs 2025-08-18 at 07:47 By Mirko Zorz Prevention effectiveness is falling, detection gaps remain wide, and attackers are exploiting weaknesses in data protection and credentials. Data theft prevention has dropped to 3 percent, password cracking success rates have nearly doubled, and new threat groups are bypassing

React to this headline:

Loading spinner

Weak alerting and slipping prevention raise risk levels for CISOs Read More »

Bridging the AI model governance gap: Key findings for CISOs

Bridging the AI model governance gap: Key findings for CISOs 2025-08-18 at 07:47 By Anamarija Pogorelec While most organizations understand the need for strong AI model governance, many are still struggling to close gaps that could slow adoption and increase risk. The findings of a new Anaconda survey of more than 300 AI practitioners and

React to this headline:

Loading spinner

Bridging the AI model governance gap: Key findings for CISOs Read More »

Cyber insurance market shows early signs of maturity

Cyber insurance market shows early signs of maturity 2025-08-15 at 09:06 By Sinisa Markovic The cyber insurance market is entering a new phase of evolution and showing early signs of maturity, according to recent research from Arctic Wolf. Brokers and carriers are taking on different but connected roles to help customers get policies. Brokers advise

React to this headline:

Loading spinner

Cyber insurance market shows early signs of maturity Read More »

Employees race to build custom AI apps despite security risks

Employees race to build custom AI apps despite security risks 2025-08-15 at 07:37 By Help Net Security The latest Netskope findings show a 50% increase in GenAI platform usage among enterprise end-users, driven by growing employee demand for tools to develop custom AI applications and agents. Top LLM interfaces by percentage in organizations (source: Netskope)

React to this headline:

Loading spinner

Employees race to build custom AI apps despite security risks Read More »

AI is changing Kubernetes faster than most teams can keep up

AI is changing Kubernetes faster than most teams can keep up 2025-08-14 at 07:32 By Sinisa Markovic AI is changing how enterprises approach Kubernetes operations, strategy, and scale. The 2025 State of Production Kubernetes report from Spectro Cloud paints a picture of where the industry is heading: AI is shaping decisions around infrastructure cost, tooling,

React to this headline:

Loading spinner

AI is changing Kubernetes faster than most teams can keep up Read More »

Global OT cyber risk could top $329 billion, new report warns

Global OT cyber risk could top $329 billion, new report warns 2025-08-13 at 07:36 By Anamarija Pogorelec A new study from Dragos and Marsh McLennan puts hard numbers on the global financial risk tied to OT cyber incidents. The 2025 OT Security Financial Risk Report estimates that the most extreme scenarios could place more than

React to this headline:

Loading spinner

Global OT cyber risk could top $329 billion, new report warns Read More »

CISOs face a complex tangle of tools, threats, and AI uncertainty

CISOs face a complex tangle of tools, threats, and AI uncertainty 2025-08-13 at 07:02 By Anamarija Pogorelec Most organizations are juggling too many tools, struggling with security blind spots, and rushing into AI adoption without governance, according to JumpCloud. he average organization now uses more than nine tools to manage core IT functions. That is

React to this headline:

Loading spinner

CISOs face a complex tangle of tools, threats, and AI uncertainty Read More »

Why DNS threats should be on every CISO’s radar in 2025

Why DNS threats should be on every CISO’s radar in 2025 2025-08-12 at 07:32 By Sinisa Markovic DNS is once again in the crosshairs of threat actors. According to the 2025 DNS Threat Landscape Report by Infoblox, attackers are changing tactics, and enterprises are feeling the pressure. The report shows that DNS is being used

React to this headline:

Loading spinner

Why DNS threats should be on every CISO’s radar in 2025 Read More »

Pentesting is now central to CISO strategy

Pentesting is now central to CISO strategy 2025-08-11 at 07:36 By Anamarija Pogorelec Security leaders are rethinking their approach to cybersecurity as digital supply chains expand and generative AI becomes embedded in critical systems. A recent survey of 225 security leaders conducted by Emerald Research found that 68% are concerned about the risks posed by

React to this headline:

Loading spinner

Pentesting is now central to CISO strategy Read More »

Scroll to Top