Your Mid-Year BCP Wake-Up Call: Is Your Business Ready? A Business Continuity Plan is a silent safety net, but it requires regular maintenance. Pam Nigro August 27, 2025 A Business Continuity Plan is a silent safety net, but it requires regular maintenance.Read More
Report Reveals Gap Between AI Use and AI Security In Embedded Software Security Staff August 26, 2025 A new report reveals a disconnect between the organizational use of AI and AI security. Read More
5 Minutes With Avoid Falling Victim to Increasingly Sophisticated Threat Actors Jordyn Alger August 26, 2025 Security magazine talks with Dr. Renée Burton, VP of Threat Intelligence, about how organizations can avoid falling victim to evolving cyberattacks. Read More
The (Microsoft) Windows Are Wide Open for Bad Actors Jason Stewart August 26, 2025 Most healthcare organizations won’t be able to fully transition to Windows 11 before Microsoft ends Windows 10 support. That means that bad actors will soon be launching malware that takes advantage. Read More
CISA Issues Software Bill of Materials Draft, Encourages Public Comments Security Staff August 25, 2025 CISA published a Minimum Elements for a Software Bill of Materials (SBOM) draft and has encouraged the public to offer comments. Read More
91% of Teens Use Generative AI Security Staff August 25, 2025 A recent survey found that when presented with an online safety issue, most teen respondents will ask for help from a parent or other trusted adult. Read More
Agentic AI Browsers Exploited by “PromptFix” Trick Technique Jordyn Alger August 25, 2025 Agentic AI, while performing routine tasks such as shopping online, could be tricked into carrying out certain actions. Read More
Russia-Sponsored Cyberattack Campaign Targets Networking Devices, Critical Infrastructure Jordyn Alger August 22, 2025 A Russia-sponsored campaign is targeting end-of-life devices via a seven-year-old vulnerability. Read More
Pharmaceutical Firm Hit With Ransomware Attack Jordyn Alger August 22, 2025 Inotiv, a pharmaceutical firm, was hit with a ransomware attack.Read More
Integrated Solutions Take a Look Inside: Managing and Mitigating Insider Risk As with all things security, a proactive approach to mitigate potential risk is critical — the same is true to manage with managing insider risks. Mason C. Clutter August 22, 2025 A former Chief Privacy Officer to the U.S. Department of Homeland Security shares insights on managing insider risk.Read More