As AI drives deeper dependence across business, supply chains, and national security, the buildings that run the cloud are becoming critical infrastructure — and increasingly attractive targets.
Anthropic recently announced that it would not release Mythos, its most powerful AI model, to the public. The model discovered thousands of previously unknown software vulnerabilities —…
When attackers can discover and exploit vulnerabilities in minutes, last quarter's audit doesn't mean much. CISOs need to shift from static measurement to real-time awareness -- and…
Two weeks ago, a suspected North Korean threat actor slipped malicious code into a package within Axios, a widely used JavaScript library. The immediate concern was the…
Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for.
Nvidia CEO Jensen Huang participates in a Q&A at the company’s annual GTC developers conference in San Jose, California, on March 17, 2026. Huang on Monday said the leading artificial intelligence chip maker is heading for space with a goal of powering orbiting data centers. (Photo by JOSH EDELSON / AFP via Getty Images)
A string of federal indictments has exposed a pervasive shadow network of data centers and fake products spanning Southeast Asia. To secure national security, the U.S. must…
Sean Plankey, of Pennsylvania, responds to questioning during Senate Committee on Homeland Security and Governmental Affairs hearings to examine his nomination to be Director of the Cybersecurity and Infrastructure Security Agency, of the Department of Homeland Security, in the Dirksen Senate office building, in Washington, DC, on Wednesday July 24, 2025. (Mattie Neretin/CNP/Sipa USA)
As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructure and adopt a layered, real-time defense to neutralize sophisticated crime rings.
Quantum computing promises a revolution in science, but it also signals the end of current security standards. Here is why enterprises must transition to post-quantum cryptography before…