EU tightens cybersecurity rules for tech supply chains

The European Commission has proposed a new cybersecurity package aimed at strengthening the EU’s cyber resilience, including a revised EU Cybersecurity Act designed to secure ICT supply chains and ensure products reaching EU citizens are secure by desi… Continue reading EU tightens cybersecurity rules for tech supply chains

Rust package registry adds security tools and metrics to crates.io

The Rust project updated crates.io to include a Security tab on individual crate pages. The tab shows security advisories drawn from the RustSec database and lists which versions of a crate may have known issues. This change gives developers a way to v… Continue reading Rust package registry adds security tools and metrics to crates.io

Security leaders push for continuous controls as audits stay manual

Security teams say they want real-time insight into controls, but still rely on periodic checks that trail daily operations. New RegScale research shows how wide that gap remains and where organizations are directing time, staff, and budget to manage i… Continue reading Security leaders push for continuous controls as audits stay manual

Let’s Encrypt rolls out 6-day and IP-based certificates

Let’s Encrypt says its short-lived TLS certificates with a 6-day lifetime are now generally available. Each certificate is valid for 160 hours from the time it is issued. To request one, operators must select the “shortlived” profile in their ACME clie… Continue reading Let’s Encrypt rolls out 6-day and IP-based certificates

Product showcase: PrivacyHawk for iOS helps users track and remove personal data from data brokers

Every interaction online, from signing up for a newsletter to making a purchase, leaves a trace. These traces are collected by data brokers and resold to advertisers, analytics firms, or, in some cases, criminals on the dark web. As personal informatio… Continue reading Product showcase: PrivacyHawk for iOS helps users track and remove personal data from data brokers

Privacy teams feel the strain as AI, breaches, and budgets collide

Privacy programs are under strain as organizations manage breach risk, new technology, and limited resources. A global study from ISACA shows that AI is gaining ground in privacy work, with use shaped by governance, funding, and how consistently privac… Continue reading Privacy teams feel the strain as AI, breaches, and budgets collide

A new European standard outlines security requirements for AI

The European Telecommunications Standards Institute (ETSI) has released a new European Standard that addresses a growing concern for security teams working with AI. The standard, ETSI EN 304 223, sets baseline cybersecurity requirements for AI models a… Continue reading A new European standard outlines security requirements for AI

When the Olympics connect everything, attackers pay attention

Global sporting events bring a surge of network traffic, new systems, and short term partnerships. That mix draws attention from cyber threat actors who see opportunity in scale and distraction. A new Palo Alto Networks threat study on the Milan Cortin… Continue reading When the Olympics connect everything, attackers pay attention

Cyber risk keeps winning, even as AI takes over

Cyber risk continues to dominate global business concerns, with AI rising quickly alongside it. According to a new risk survey from Allianz, both are influencing how organizations plan for disruption, resilience, and recovery across regions and industr… Continue reading Cyber risk keeps winning, even as AI takes over