News
4 questions to ask before outsourcing MDR
2+ hour, 10+ min ago (608+ words) Security teams are stretched thin. Alerts never stop, attackers move faster, and expectations for uptime and resilience keep rising. For many IT and security leaders, Managed Detection and Response (MDR) has become less of a "nice to have" and more…...
5 trends defining the future of AI-powered cybersecurity
2+ hour, 10+ min ago (672+ words) The new N-able and Futurum Report reveals how AI is reshaping cyber resilience as it accelerates both business innovation and adversarial tradecraft. Attackers are scaling their operations with unprecedented speed, leveraging automation to bypass traditional defenses. For IT security leaders…...
EU regulators largely denied access to Anthropic Mythos
10+ hour, 18+ min ago (504+ words) European regulators have largely been frozen out of early access to Anthropic's new Mythos model, Politico reports. The AI technology, aimed at cybersecurity use cases, is said to be able to identify and exploit technical vulnerabilities at a level that…...
From code to boardroom: A Gen AI GRC approach to supply chain risk
4+ mon, 3+ week ago (515+ words) I know the pressure chief information security officers face right now. We spent years hardening our own perimeter, then a few more managing the third-party vendor risk. Now, we are facing an existential threat from the fourth, fifth and nth…...
Security Monitoring Software
1+ mon, 3+ week ago (428+ words) | News, how-tos, features, reviews, and videos Cloud SIEMs are great until a "noisy neighbor" hogs all the resources. You need a vendor that actually engineers fairness so their spike doesn't break your security. Anomaly detection can be powerful in spotting…...
A new approach for Gen AI risk protection
1+ mon, 3+ week ago (270+ words) Before we jump into protection mode, we must first ask ourselves: "What is it we are trying to protect with Gen AI?" I see 3 primary objectives: 1) sensitive corporate data and intellectual property, 2) PII, PHI and 3) malware, maliciously generated code, etc....
CISOs" top 10 cybersecurity priorities for 2026
3+ mon, 6+ day ago (1626+ words) Cybersecurity threats are becoming more sophisticated, more automated, and more intelligent, as well as harder to detect. At the same time the enterprise attack surface CISOs are tasked to defend continues to expand. That's the reality security chiefs face in…...
5 critical steps to achieve business resilience in cybersecurity
1+ week, 6+ day ago (403+ words) What does it really take to keep your organization running when attackers strike? The answer is business resilience'being able to detect, contain, and recover fast enough that disruptions areminimized, customers stay confident, and operations keep moving." From the latest2026 State of…...
Top 10 vendors for AI-enabled security " according to CISOs
23+ hour, 17+ min ago (429+ words) Venture capital may be flowing to trendy AI security startups, but battle-tested CISOs seem to be sticking with tried-and-true, name-brand technology partners for their AI-enabled security needs. That's the key takeaway from CSO's 2025 Security Priorities Study, which collected responses from…...
6 ways attackers abuse AI services to hack your business
1+ week, 1+ day ago (1094+ words) Attackers are starting to exploit AI systems to mount attacks in the same way they once relied on built-in enterprise tools such as Power Shell. Instead of relying on malware, cybercriminals are increasingly abusing AI tools enterprises depend on " a…...