survey

Inside the economy built on stolen credentials

Inside the economy built on stolen credentials 2025-09-26 at 09:08 By Sinisa Markovic Instead of going after software flaws or network weaknesses, attackers are targeting something much easier to steal: identity credentials. A new report from BeyondID calls this growing black market the identity economy, where usernames, passwords, tokens, and access rights are bought and […]

React to this headline:

Loading spinner

Inside the economy built on stolen credentials Read More »

GenAI is exposing sensitive data at scale

GenAI is exposing sensitive data at scale 2025-09-25 at 07:46 By Anamarija Pogorelec Sensitive data is everywhere and growing fast. A new report from Concentric AI highlights how unstructured data, duplicate files, and risky sharing practices are creating serious problems for security teams. The findings show how generative AI tools like Microsoft Copilot are adding

React to this headline:

Loading spinner

GenAI is exposing sensitive data at scale Read More »

A look inside 1,000 cyber range events and what they reveal about AppSec

A look inside 1,000 cyber range events and what they reveal about AppSec 2025-09-24 at 07:45 By Anamarija Pogorelec Software powers almost every part of business, which means attackers have more chances than ever to exploit insecure code. A new report from CMD+CTRL Security looks at how teams are building their defenses through cyber range

React to this headline:

Loading spinner

A look inside 1,000 cyber range events and what they reveal about AppSec Read More »

Kubernetes matures as AI and GitOps reshape operations

Kubernetes matures as AI and GitOps reshape operations 2025-09-22 at 08:09 By Anamarija Pogorelec Kubernetes has moved well past its early adoption phase. The new Komodor 2025 Enterprise Kubernetes Report shows that technical teams are shifting their focus from running containers to managing a growing mix of AI workloads and advanced automation practices like GitOps.

React to this headline:

Loading spinner

Kubernetes matures as AI and GitOps reshape operations Read More »

Global hiring risks: What you need to know about identity fraud and screening trends

Global hiring risks: What you need to know about identity fraud and screening trends 2025-09-18 at 07:10 By Anamarija Pogorelec Hiring new employees has always carried some risk, but that risk is growing in new ways, and identity fraud is becoming more common in the hiring process. HireRight’s 2025 Global Benchmark Report takes a close

React to this headline:

Loading spinner

Global hiring risks: What you need to know about identity fraud and screening trends Read More »

OT security needs continuous operations, not one-time fixes

OT security needs continuous operations, not one-time fixes 2025-09-16 at 08:40 By Anamarija Pogorelec Cyberattacks keep hitting the OT systems that critical infrastructure operators run, according to new research from Forrester. In a survey of 262 OT security decision-makers, 91% reported at least one breach or system failure caused by a cyberattack in the past

React to this headline:

Loading spinner

OT security needs continuous operations, not one-time fixes Read More »

Why organizations need a new approach to risk management

Why organizations need a new approach to risk management 2025-09-11 at 07:12 By Anamarija Pogorelec To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk ownership.” This is a future state where business leaders don’t just identify and manage risks after they occur, but instinctively

React to this headline:

Loading spinner

Why organizations need a new approach to risk management Read More »

AI agents are here, now comes the hard part for CISOs

AI agents are here, now comes the hard part for CISOs 2025-09-10 at 07:40 By Mirko Zorz AI agents are being deployed inside enterprises today to handle tasks across security operations. This shift creates new opportunities for security teams but also introduces new risks. Google Cloud’s new report, The ROI of AI 2025, shows that

React to this headline:

Loading spinner

AI agents are here, now comes the hard part for CISOs Read More »

CISOs, stop chasing vulnerabilities and start managing human risk

CISOs, stop chasing vulnerabilities and start managing human risk 2025-09-10 at 07:25 By Anamarija Pogorelec Breaches continue to grow in scale and speed, yet the weakest point remains unchanged: people. According to Dune Security’s 2025 CISO Risk Intelligence Survey, over 90 percent of incidents still originate from user behavior rather than technical flaws. The survey

React to this headline:

Loading spinner

CISOs, stop chasing vulnerabilities and start managing human risk Read More »

Identity management was hard, AI made it harder

Identity management was hard, AI made it harder 2025-09-08 at 07:33 By Anamarija Pogorelec Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven identities and machine accounts grow, most security teams are not prepared to manage them at scale.

React to this headline:

Loading spinner

Identity management was hard, AI made it harder Read More »

AI moves fast, but data security must move faster

AI moves fast, but data security must move faster 2025-09-08 at 07:03 By Anamarija Pogorelec Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and unfamiliar security risks. As companies rush to adopt these tools, many are discovering

React to this headline:

Loading spinner

AI moves fast, but data security must move faster Read More »

File security risks rise as insiders, malware, and AI challenges converge

File security risks rise as insiders, malware, and AI challenges converge 2025-09-05 at 08:42 By Anamarija Pogorelec Breaches tied to file access are happening often, and the costs add up quickly. Many organizations have faced multiple file-related incidents over the last two years, with financial losses stretching into the millions. The fallout often includes stolen

React to this headline:

Loading spinner

File security risks rise as insiders, malware, and AI challenges converge Read More »

Connected cars are smart, convenient, and open to cyberattacks

Connected cars are smart, convenient, and open to cyberattacks 2025-09-05 at 07:32 By Sinisa Markovic Consumers are concerned about vulnerabilities in their vehicles, which directly impacts purchasing behavior and brand loyalty, according to RunSafe Security. Vehicles now run on over 100 million lines of code, which is more than most fighter jets, but they often

React to this headline:

Loading spinner

Connected cars are smart, convenient, and open to cyberattacks Read More »

Attackers are turning Salesforce trust into their biggest weapon

Attackers are turning Salesforce trust into their biggest weapon 2025-09-04 at 09:02 By Sinisa Markovic Salesforce has become a major target for attackers in 2025, according to new WithSecure research into threats affecting customer relationship management (CRM) platforms. The report shows that malicious activity inside Salesforce environments rose sharply in the first quarter of this

React to this headline:

Loading spinner

Attackers are turning Salesforce trust into their biggest weapon Read More »

DDoS attacks serve as instruments of political influence and disruption

DDoS attacks serve as instruments of political influence and disruption 2025-09-04 at 07:02 By Sinisa Markovic In the first half of 2025, there were 8,062,971 DDoS attacks worldwide, with EMEA taking the brunt at 3.2 million attacks, according to Netscout. Peak attacks reached speeds of 3.12 Tbps and 1.5 Gpps. These attacks have moved beyond

React to this headline:

Loading spinner

DDoS attacks serve as instruments of political influence and disruption Read More »

AI will drive purchases this year, but not without questions

AI will drive purchases this year, but not without questions 2025-09-03 at 07:04 By Sinisa Markovic AI is moving into security operations, but CISOs are approaching it with a mix of optimism and realism. A new report from Arctic Wolf shows that most organizations are exploring or adopting AI-driven tools, yet many still see risks

React to this headline:

Loading spinner

AI will drive purchases this year, but not without questions Read More »

Complexity and AI put identity protection to the test

Complexity and AI put identity protection to the test 2025-09-02 at 08:06 By Anamarija Pogorelec Identity has become a core pillar of cybersecurity strategy. Remote work, cloud-first adoption, and distributed supply chains have moved identity from “a tactical IT consideration to a strategic pillar of cybersecurity,” according to Cisco Duo’s 2025 State of Identity Security

React to this headline:

Loading spinner

Complexity and AI put identity protection to the test Read More »

GenAI is fueling smarter fraud, but broken teamwork is the real problem

GenAI is fueling smarter fraud, but broken teamwork is the real problem 2025-09-01 at 08:03 By Anamarija Pogorelec More than 80 percent of large U.S. companies were targeted by socially engineered fraud in the past year, according to Trustmi’s 2025 Socially Engineered Fraud & Risk Report. Nearly half of those organizations reported a direct financial

React to this headline:

Loading spinner

GenAI is fueling smarter fraud, but broken teamwork is the real problem Read More »

AI can’t deliver without trusted, well-governed information

AI can’t deliver without trusted, well-governed information 2025-08-29 at 10:03 By Sinisa Markovic While enterprise IT leaders recognize the transformative potential of AI, a gap in information readiness is causing their organizations to struggle in securing, governing, and aligning AI initiatives across business, according to a survey conducted by the Ponemon Institute. Who is the

React to this headline:

Loading spinner

AI can’t deliver without trusted, well-governed information Read More »

Social media apps that aggressively harvest user data

Social media apps that aggressively harvest user data 2025-08-27 at 07:10 By Sinisa Markovic Both domestic and foreign technology companies collect vast amounts of Americans’ personal data through mobile applications, according to Incogni. Some apps leverage data for marketing and advertising purposes, feeding algorithms to calculate optimal prices based on consumer behavior, often leading to

React to this headline:

Loading spinner

Social media apps that aggressively harvest user data Read More »

Scroll to Top