White House Issues Executive Order on AI Security Standards for Critical Infrastructure
New executive order mandates AI security assessments and red-teaming requirements for AI systems deployed in critical infrastructure sectors.
Breaking news, breach analysis, company rankings, and expert guides for security professionals.
New executive order mandates AI security assessments and red-teaming requirements for AI systems deployed in critical infrastructure sectors.
Chainalysis report shows ransomware payments dropped to $650 million in 2025, the lowest since 2020, driven by better backups and law enforcement pressure.
The largest distributed denial-of-service attack ever recorded targeted a major financial services firm, demonstrating the escalating scale of volumetric attacks.
SQL injection vulnerability in legacy loan application system led to exfiltration of customer financial data over three-month period.
BlackSuit ransomware group encrypted systems at major healthcare IT provider, forcing hospitals to divert patients and revert to paper records.
Malicious code injected into popular JavaScript library harvested payment card data from online shoppers for six weeks.
Comprehensive ranking of cloud-native application protection platforms (CNAPPs) based on capabilities, integration, and customer satisfaction.
Ranking the best MDR providers for organizations seeking 24/7 threat monitoring, detection, and response capabilities.
Comprehensive ranking of the best endpoint detection and response (EDR) solutions based on threat detection, performance, and value.
Framework for building security into cloud deployments from the ground up, covering identity, network, data, and workload protection.
Learn the methodology, tools, and techniques for proactive threat hunting to identify adversaries before they achieve their objectives.
Comprehensive guide to integrating security throughout the software development lifecycle, from requirements to deployment and operations.
Autonomous cybersecurity platform delivering AI-powered endpoint, cloud, and identity protection with automated response capabilities.
Developer security platform enabling teams to find, prioritize, and fix vulnerabilities in code, dependencies, containers, and infrastructure as code.
Cloud security platform providing agentless visibility, risk assessment, and threat detection across multi-cloud environments.
Practical guidance for implementing NIST CSF 2.0's new Govern function and updated framework components in your organization.
Complete guide to PCI DSS 4.0 requirements, key changes from 3.2.1, and timeline for compliance with the new payment card security standard.
Understanding the key requirements for GDPR-compliant data processing agreements between controllers and processors.