Tag: EN

Waiting for AI superintelligence? Don’t hold your breath

AI’s impact on systems, security, and decision-making is already permanent. Superintelligence, often referred to as artificial superintelligence (ASI), describes a theoretical stage in which AI capability exceeds human cognitive performance across domains. Whether current systems are progressing toward cybersecurity superintelligence…

AI’s appetite for data is testing enterprise guardrails

Privacy programs are taking on more operational responsibility across the enterprise. A new Cisco global benchmark study shows expanding mandates, rising investment, and sustained pressure around data quality, accountability, and cross-border data management tied to AI systems. Privacy programs grow…

SoundCloud – 29,815,722 breached accounts

In December 2025, SoundCloud announced it had discovered unauthorised activity on its platform. The incident allowed an attacker to map publicly available SoundCloud profile data to email addresses for approximately 20% of its users. The impacted data included 30M unique…

The 7 Essential Elements of a Compliance Framework You Need to Know

Key Takeaways Regulatory expectations continue to expand. Oversight bodies increasingly look beyond documentation to how organizations manage compliance risk in practice. In this environment, compliance functions best when supported by a structured framework. While industries and jurisdictions vary, effective, high-quality…

Who Operates the Badbox 2.0 Botnet?

The cybercriminals in control of Kimwolf — a disruptive botnet that has infected more than 2 million devices — recently shared a screenshot indicating they’d compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software…

What exciting new developments are happening in NHIs?

Are Organizations Prepared for the Challenges of Non-Human Identities? Understanding Non-Human Identities in Cybersecurity How do organizations safeguard their machine identities? One emerging focus is the management of Non-Human Identities (NHIs), a paramount aspect of digital protection. NHIs comprise machine…

Why be optimistic about the future of secrets management?

How Does Non-Human Identity Management Revolutionize Secrets Security? Is your organization effectively managing its non-human identities (NHIs)? With the growing complexity of interconnected systems and the surge of machine identities, securing these non-human entities has become a cornerstone in protecting…

How smart can NHIs be in complex enterprise environments?

What Are Non-Human Identities and Why Do They Matter in Complex Enterprise Environments? Where digital transformation accelerates work processes, the concept of Non-Human Identities (NHIs) becomes increasingly important among enterprise environments. But what exactly are NHIs, and why should organizations…

Can Agentic AI operate independently in high-stakes areas?

Can Independent Agentic AI Safeguard Our Critical Systems? Have you ever wondered how we can entrust critical operations to independent systems? The emergence of Agentic AI, with its capacity to operate autonomously, has sparked considerable discussion about its potential role…