Category: EN

89% of enterprise AI usage is invisible to the organization

Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal non-corporate accounts. Among logins using corporate accounts, 58% of connections are done without…

Cybereason CEO leaves after months of boardroom blowups

Complaint alleges 13 funding proposals foundered amid battle for control Eric Gan is no longer CEO of AI security biz Cybereason after what appears to have been a protracted and unpleasant fight with investors, including the SoftBank Vision Fund and…

Expert Q&A: How To Safely Turn AI Into Your Security Ally

Admins are in a tough position right now. Enterprise ecosystems are expanding, role responsibilities are growing, and hackers are getting smarter. Rather than viewing AI as another potential vulnerability, Hexnode CEO Apu Pavithran argues that admins must embrace it as…

What are the latest trends in NHI protection for CIOs?

Are CIOs Prepared for the Rising NHI Trends? When the cloud environment evolves to deliver seamless business solutions, it brings along unique challenges in terms of data security. Needless to say, managing Non-Human Identities (NHIs) has become a primary concern…

What are the risks of unmanaged NHIs in enterprise environments?

Are Unmanaged Non-Human Identities (NHIs) Jeopardizing Your Enterprise Environment? With cloud-native applications, AI technologies, and IoT devices permeating modern enterprises, Non-Human Identities (NHIs) have become critical components. But what happens when these NHIs are left unmanaged? Do you comprehend the…

How Unified SSO reduces complexity and enhances security

Large enterprises operate complex IT environments, balancing legacy on-premises applications with modern cloud services. Over time, they have accumulated multiple identity providers (IDPs) like Microsoft Entra ID, Okta, and Ping Identity to manage authentication across different business units and applications.…

The best VPN routers of 2025

Looking for a router that can provide full, convenient VPN coverage at home? These are the best routers that support VPN installation or include pre-installed software. This article has been indexed from Latest stories for ZDNET in Security Read the…

China-linked APT Silk Typhoon targets IT Supply Chain

Microsoft warns that China-backed APT Silk Typhoon linked to US Treasury hack, is now targeting global IT supply chains, using IT firms to spy and move laterally. Microsoft reported that China-linked APT group Silk Typhoon has shifted tactics to target…

Ransomware Attack Ends a 150 Year Company

  Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on digital technology – even if it is…

DEF CON 32 – War Stories – Stranger In A Changed Land

Author/Presenter: Tony Sage Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The…