Proofpoint acquires Acuvity to tackle the security risks of agentic AI

Proofpoint is snapping up the startup to solve the industry’s newest headache: knowing what your autonomous AI is actually doing.

The post Proofpoint acquires Acuvity to tackle the security risks of agentic AI appeared first on CyberScoop.

Continue reading Proofpoint acquires Acuvity to tackle the security risks of agentic AI

Why boards should be obsessed with their most ‘boring’ systems

Following a series of high-profile cyberattacks, boards of directors are now requiring their organizations to take greater responsibility for the risks posed by enterprise resource planning (ERP) systems pose after a series of high-profile cyberattacks. The Jaguar Land Rover (JLR), incident in Sept. 2025 illustrates the severe consequences of such attacks. The cyberattack forced JLR […]

The post Why boards should be obsessed with their most ‘boring’ systems appeared first on CyberScoop.

Continue reading Why boards should be obsessed with their most ‘boring’ systems

Sean Cairncross’ cybersecurity agenda: less regulation, more cooperation

Cut the regulatory burden, boost information sharing, and get Congress moving: that’s the pitch as the White House readies a new cyber strategy.

The post Sean Cairncross’ cybersecurity agenda: less regulation, more cooperation appeared first on CyberScoop.

Continue reading Sean Cairncross’ cybersecurity agenda: less regulation, more cooperation

We moved fast and broke things. It’s time for a change.

For 20 years, tech has moved fast and broken things. The result: a cybersecurity crisis built on rushed code and vulnerable software. It’s time to replace speed-at-all-costs with a security-first approach.

The post We moved fast and broke things. It’s time for a change. appeared first on CyberScoop.

Continue reading We moved fast and broke things. It’s time for a change.

Cybersecurity can be America’s secret weapon in the AI race

Beijing is aggressively exploiting global data for strategic purposes. AI-powered cybersecurity is essential to Washington’s counter-offensive to win the global market.

The post Cybersecurity can be America’s secret weapon in the AI race appeared first on CyberScoop.

Continue reading Cybersecurity can be America’s secret weapon in the AI race

If you don’t control your keys, you don’t control your data

A recent Forbes investigation revealed that Microsoft has allegedly been handing over Bitlocker encryption recovery keys to law enforcement when served with warrants. Microsoft says it receives about 20 such requests annually. Taken narrowly, this may appear to be a routine case of lawful compliance. On closer inspection, it raises a consequential question about how […]

The post If you don’t control your keys, you don’t control your data appeared first on CyberScoop.

Continue reading If you don’t control your keys, you don’t control your data

GCVE launches as a decentralized system for tracking software vulnerabilities

The new system emerges after repeated funding crises exposed the fragility of the 25-year-old CVE program that cybersecurity defenders worldwide depend on.

The post GCVE launches as a decentralized system for tracking software vulnerabilities appeared first on CyberScoop.

Continue reading GCVE launches as a decentralized system for tracking software vulnerabilities

Predator bots are exploiting APIs at scale. Here’s how defenders must respond.

The rise of malicious bots is changing how the internet operates, underscoring the need for stronger safeguards that keep humans firmly in control. Bots now account for more than half of global web traffic, and a new class of “predator bots” has emerged, unleashing self-learning programs that adapt in real time, mimic human behavior, and […]

The post Predator bots are exploiting APIs at scale. Here’s how defenders must respond. appeared first on CyberScoop.

Continue reading Predator bots are exploiting APIs at scale. Here’s how defenders must respond.