Free courses: Master AI tools from Microsoft, AWS, and Google

Learn how AI technologies can be applied to enhance security, create safe and responsible applications, develop intelligent agents, and improve information discovery. You’ll gain practical skills, explore new tools, and work on projects that help… Continue reading Free courses: Master AI tools from Microsoft, AWS, and Google

NIST finalizes lightweight cryptography standard for small devices

The National Institute of Standards and Technology (NIST) has finalized a lightweight cryptography standard to protect even the smallest networked devices from cyberattacks. Published as Ascon-Based Lightweight Cryptography Standards for Constrained De… Continue reading NIST finalizes lightweight cryptography standard for small devices

Product showcase: Apricorn Aegis NVX, a high-security, portable SSD

The Apricorn Aegis NVX is a hardware-based 256-Bit AES XTS external SSD drive with integrated USB-C cable. Its storage capacities range from 500GB to 2TB. The device is OS free and cross-platform compatible. Design and build The drive comes with a comp… Continue reading Product showcase: Apricorn Aegis NVX, a high-security, portable SSD

Global OT cyber risk could top $329 billion, new report warns

A new study from Dragos and Marsh McLennan puts hard numbers on the global financial risk tied to OT cyber incidents. The 2025 OT Security Financial Risk Report estimates that the most extreme scenarios could place more than $329.5 billion at risk worl… Continue reading Global OT cyber risk could top $329 billion, new report warns

CISOs face a complex tangle of tools, threats, and AI uncertainty

Most organizations are juggling too many tools, struggling with security blind spots, and rushing into AI adoption without governance, according to JumpCloud. he average organization now uses more than nine tools to manage core IT functions. That is fu… Continue reading CISOs face a complex tangle of tools, threats, and AI uncertainty

What the Matter 1.4.2 update means for smart home security

Matter is built on the idea that smart home devices should be secure, reliable, and easy to use. It is based on Internet Protocol (IP), which allows devices, mobile apps, and cloud services to communicate. Matter also defines a set of IP-based networki… Continue reading What the Matter 1.4.2 update means for smart home security

Pentesting is now central to CISO strategy

Security leaders are rethinking their approach to cybersecurity as digital supply chains expand and generative AI becomes embedded in critical systems. A recent survey of 225 security leaders conducted by Emerald Research found that 68% are concerned a… Continue reading Pentesting is now central to CISO strategy

Energy companies are blind to thousands of exposed services

Many of America’s largest energy providers are exposed to known and exploitable vulnerabilities, and most security teams may not even see them, according to a new report from SixMap. Researchers assessed the external attack surface of 21 major energy c… Continue reading Energy companies are blind to thousands of exposed services