News
When Liability Turns the CISO Into the Fall Guy
1+ week, 7+ hour ago (768+ words) CISO Trainings , Leadership & Executive Communication , Litigation See Also: Free Your IT Program of Tech Debt With an Enterprise Browser (eBook) Following high-profile legal actions against security executives at SolarWinds and Uber, the laughter in the industry has largely disappeared. The…...
Fig Security Raises $30M to Modernize SOC Infrastructure
2+ week, 2+ day ago (491+ words) Security Operations , Security Operations Center (SOC) A startup run by a former Google security architect leader raised $30 million to provide observability across the entire security operations infrastructure. See Also: OnDemand | Getting started with OpenTelemetry: Planning and tips for observability teams…...
Webinar | Risks in AI-Native Systems: Why AI Security Is Still an API Security Problem
2+ day, 10+ hour ago (125+ words) API Security , Fraud Management & Cybercrime , Fraud Risk Management The shift to AI-native design drastically expands the enterprise API attack surface. Large Language Models (LLMs) and autonomous agents operate via complex, API-chained workflows. This reality of AI system architecture introduces high-velocity,…...
Breaking Down Siloed Security: Aligning SecOps and GRC for Cyber Resilience
1+ week, 2+ day ago (161+ words) 3rd Party Risk Management , Fraud Management & Cybercrime , Fraud Risk Management Security teams often operate in silos, with SecOps focused on immediate threats while governance, risk and compliance (GRC) teams concentrate on policies, controls and reporting. Without alignment, organizations struggle to translate…...
Why AI Phishing Demands Stronger MFA Now
3+ day, 4+ hour ago (113+ words) Events , Gartner Summit , Video See Also: AI Scaling Requires Data Governance Framework Integration "There's no more remembering passwords or even username for some cases," said McConachie, regional director for U.K. and Ireland at Yubico. In this video interview with Information Security…...
Conducting a Security Risk Analysis Under Legal Privilege
1+ week, 6+ hour ago (319+ words) Governance & Risk Management , HIPAA/HITECH , Risk Assessments Attorneys can conduct security risks assessments under the color of client privilege, making it less likely to surface in discovery during litigation. But healthcare firms should consider the cons, as well as the…...
Why Identity Governance Needs Business Ownership
4+ day, 3+ hour ago (316+ words) Events , Gartner Summit , Governance & Risk Management Organizations continue to invest in identity governance and administration, yet many programs fall short after going live. The challenge is not product capability but adoption, said Quinton Hughes, founder of Integralis, and Paul Walker,…...
Medtech Firm Stryker Disrupted by Pro-Iran Hackers
1+ week, 2+ day ago (1092+ words) Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Healthcare Michigan-based Stryker just after midnight East Coast time on Wednesday experienced an organization-wide systems outage disruption, including some mobile devices being wiped, and some log-in screens replaced with the logo of Handala, as…...
Malicious Repo Files Could Hijack Claude Code Sessions
3+ week, 1+ day ago (42+ words) Check Point research found three critical flaws in Anthropic's Claude Code that allow attackers to execute arbitrary commands and steal API keys through repository ... Join the ISMG Community Thank you for registering with ISMG Complete your profile and stay up…...
Cryptohack Roundup: Paxful's $4M Penalty
1+ mon, 2+ day ago (45+ words) This week, Paxful's $4M AML penalty, Coinbase's agentic AI wallets, a $1M fraud indictment, a 20-year $200M Ponzi sentence, laundering from the $200M Mixin hack, a ... Join the ISMG Community Thank you for registering with ISMG Complete your profile and stay up to date...