The browser is eating your security stack

Employees log into SaaS platforms, upload files, use AI tools, and manage customer data from a single tab. While the browser has become the enterprise’s main workspace, it remains largely outside the reach of security controls. According to the 2025 Br… Continue reading The browser is eating your security stack

AI is forcing boards to rethink how they govern security

Boards are spending more time on cybersecurity but still struggle to show how investments improve business performance. The focus has shifted from whether to fund protection to how to measure its return and ensure it supports growth. AI, automation, an… Continue reading AI is forcing boards to rethink how they govern security

What the latest data reveals about hard drive reliability

What really counts as a hard drive failure? That’s the question at the center of Backblaze’s Q3 2025 Drive Stats report, which tracks the performance of 328,348 hard drives across its global data centers. The latest findings build on more than a decade… Continue reading What the latest data reveals about hard drive reliability

GNU Coreutils 9.9 brings fixes and updates across essential tools

GNU Coreutils is the backbone of many enterprise Linux environments. It provides the basic file, shell, and text utilities that every GNU-based system depends on. The latest release, version 9.9, refines these tools with fixes and performance improveme… Continue reading GNU Coreutils 9.9 brings fixes and updates across essential tools

Hidden risks in the financial sector’s supply chain

When a cyber attack hits a major bank or trading platform, attention usually turns to the institution. But new research suggests the real danger may lie elsewhere. BitSight researchers found that many of the technology providers serving the financial s… Continue reading Hidden risks in the financial sector’s supply chain

AI is rewriting how software is built and secured

AI has become part of everyday software development, shaping how code is written and how fast products reach users. A new report from Cycode, The 2026 State of Product Security for the AI Era, explores how deeply AI now runs through development pipelin… Continue reading AI is rewriting how software is built and secured

Old privacy laws create new risks for businesses

Businesses are increasingly being pulled into lawsuits over how they collect and share user data online. What was once the domain of large tech firms is now a widespread legal risk for companies of all sizes. The latest analysis from cyber insurer Coal… Continue reading Old privacy laws create new risks for businesses

Hospitals are running out of excuses for weak cyber hygiene

Healthcare leaders continue to treat cybersecurity as a technical safeguard instead of a strategic business function, according to the 2025 US Healthcare Cyber Resilience Survey by EY. The study, based on responses from 100 healthcare executives, outli… Continue reading Hospitals are running out of excuses for weak cyber hygiene

Russia-linked hackers intensify attacks as global APT activity shifts

State-aligned hacking groups have spent the past six months ramping up espionage, sabotage, and cybercrime campaigns across multiple regions, according to ESET’s APT Activity Report covering April through September 2025. The research highlights how ope… Continue reading Russia-linked hackers intensify attacks as global APT activity shifts