PwC: Identity compromise a supply chain for attackers
PwC's "Cyber threats in motion" report warns that AI is giving attackers added sophistication, speed, and scale, but identity remains the fulcrum of entry, a...
20 articles
PwC's "Cyber threats in motion" report warns that AI is giving attackers added sophistication, speed, and scale, but identity remains the fulcrum of entry, a...
Time to start treating sustainability telemetry as OT data.
It's easy to mount ransomware attacks upon SaaS and cloud assets, a researcher said at the BSides SF 2026 hacker conference.
The Shai-Hulud worms that exploited automatic updates in open-source software repositories may be only the beginning, two researchers said at RSAC 2026.
OX Security found AI coding assistants make the same common mistakes as humans.
Experts warn that the timeframe between disclosure and exploitation will continue to shrink, so teams must prepare.
Padraic O’Reilly and Srinivas Tummalapenta explore how cybersecurity is evolving from fragmented data collection to a unified cyber risk intelligence layer.
Matt Alderman and Evelyn Anderson explore how autonomous security programs are reshaping cyber governance.
Gibb Witham explains why organizations must move beyond assumed AI capability toward measurable, validated cyber readiness for both humans and AI systems.
Mark Lambert discusses the company's new AI Exposure Management (AIEM) solution.
Arunesh Chandra discusses why security and IT teams are rethinking the role of the browser.
Ramin Farassat discusses how a new approach to browser security is required to provide architectural immunity.