News
Living off the Land attacks pose a pernicious threat for enterprises
4+ week, 2+ day ago (328+ words) Every enterprise is vulnerable to Living off the Land attacks because the techniques rely on standard operating system functionality rather than specialized software. That said, organizations that operate complex, distributed or mission-critical environments face disproportionately higher risk. Ultimately, any organization…...
Managing AI agents and identity in a heightened risk environment
2+ day, 14+ hour ago (810+ words) Geopolitical tensions are rising. Cyber threats are accelerating. And AI is rapidly expanding the enterprise attack surface. For CIOs and CISOs, the reality is clear: cybersecurity is no longer a defensive function alone. It is now a core element of…...
AI focus shifts from potential to payback
2+ mon, 3+ week ago (745+ words) In the face of an uncertain business landscape and rising pressure to prove the business value of AI, a new phase of enterprise AI adoption is emerging: A shift in focus from experimentation to operational accountability. That transition was a…...
IGEL Now & Next 2026: Turning endpoint strategy into resilient reality
3+ day, 20+ hour ago (726+ words) Security incidents, operational outages, and infrastructure failures are no longer confined to edge cases. They are conditions that modern IT and OT environments must be designed to withstand. As a result, the conversation around endpoints is shifting. The focus is…...
Secure-by-design: 3 principles to safely scale agentic AI
3+ day, 14+ hour ago (330+ words) AI is moving from experimentation to execution. What started as copilots is quickly evolving into autonomous AI agents that can make decisions, execute tasks, and operate across enterprise environments. Security can't be layered on after AI agents are in use....
When AI goes rogue: Lessons from the Alibaba incident
4+ day, 15+ hour ago (374+ words) In cybersecurity, the most important lessons rarely come from theory, but from reality. There was no external attacker orchestrating this. No malware payload delivered through phishing. The system simply found a path and took it, like a very intelligent and…...
The real cost of manual access " and why CIOs are paying attention
5+ day, 14+ hour ago (689+ words) In my nearly two decades as an identity practitioner " including leading identity programs at global financial institutions and serving as a CISO " I've seen a recurring pattern that quietly erodes enterprise velocity. I call it "Monday morning friction." The symptoms…...
The day the perimeter broke: Securing the enterprise in the age of AI
4+ day, 11+ hour ago (555+ words) In 2024, the siren sounded for a new era of cyber warfare. Large language models (LLMs) didn't just emerge as productivity tools. They became the ultimate force multiplier for attackers, optimizing exploits at a scale previously unimaginable. Warning shots had been…...
AI machine speed is breaking VPN security
1+ week, 2+ day ago (934+ words) Remote access isn't a new problem. VPN risk isn't a new conversation. What's new, and what the Zscaler Threat Labz 2026 VPN Risk Report makes unmistakably clear, is the speed at which the threat landscape is changing. Why this matters now:…...
Google News
1+ week, 2+ day ago (11+ words) KPMG report finds enterprise disconnect between AI and its ROI'cio. com...