Category: EN

Most Inspiring Women in Cyber 2026: Meet The Judges

Next month, the annual Most Inspiring Women in Cyber Awards will take place at The BT Tower, London, celebrating some of the industry’s most inspirational – and oftentimes unsung – women. Sponsored by Fidelity International, BT, Plexal and Bridewell, and…

AVEVA Process Optimization

View CSAF Summary Successful exploitation of these vulnerabilities could enable an attacker to execute remote code, perform SQL injection, escalate privileges, or access sensitive information. The following versions of AVEVA Process Optimization are affected: Process Optimization (CVE-2025-61937, CVE-2025-64691, CVE-2025-61943, CVE-2025-65118,…

Empowering Latinas in Cybersecurity

Fortinet and Latinas in Cyber are expanding access to cybersecurity careers through training, mentorship, and certifications that empower Latina professionals.        This article has been indexed from Industry Trends & Insights Read the original article: Empowering Latinas in Cybersecurity

Fortinet FortiSIEM Vulnerability CVE-2025-64155 Actively Exploited in Attacks

Fortinet FortiSIEM vulnerability CVE-2025-64155 is under active exploitation, as confirmed by Defused through their honeypot deployments. This critical OS command injection flaw enables unauthenticated remote code execution, posing severe risks to enterprise security monitoring systems. CVE-2025-64155 stems from improper neutralization…

AI Security: What Enterprises Are Getting Wrong

The CSA Alliance has released their annual report on AI and security. Alan, Anton Chuvakin and Hillary Baron discuss the state of AI security and governance, how companies are actually adopting AI (both agentic and generative) and most importantly how…

The Next Security Battleground: Agentic Identity

Shahar Tal, CEO and co-founder of Cyata, discusses how the company is building the control plane for agentic identity. With deep roots in Israel’s Unit 8200 and Check Point, Cyata is tackling one of the next big security challenges: governing,…