Latest from todayNews Analysis69% of CISOs open to career move — including leaving role entirelyBehind those numbers are executives who are frustrated with an ever-expanding job without the budget and authority to match.By Evan SchumanFeb 10, 20266 minsC-SuiteCSO and CISOCareers Feature Software developers: Prime cyber targets and a rising risk vector for CISOsBy John LeydenFeb 9, 20269 minsApplication SecurityDevSecOpsSecurityOpinion The blind spot every CISO must see: LoyaltyBy Christopher BurgessFeb 6, 20266 minsRisk ManagementSecurity OpinionHow to govern agentic AI so as not to lose controlBy Gustavo Frega Feb 10, 20264 minsArtificial IntelligenceGenerative AISecurity OpinionNIS2: Supply chains as a risk factorBy Thomas Kress Feb 9, 20266 minsComplianceLaws and RegulationsSupply Chain NewsCISA gives federal agencies 18 months to purge unsupported edge devicesBy Gyana Swain Feb 6, 20264 minsEndpoint ProtectionNetwork SecuritySecurity NewsNew APT group breached gov and critical infrastructure orgs in 37 countriesBy Lucian Constantin Feb 5, 20265 minsAdvanced Persistent ThreatsCyberattacksCybercrime News AnalysisSoftware supply chain risks join the OWASP top 10 list, access control still on topBy Maria Korolov Feb 5, 20268 minsSecuritySoftware DevelopmentVulnerabilities FeatureThink agentic AI is hard to secure today? Just wait a few monthsBy Evan Schuman Feb 3, 20268 minsAccess ControlArtificial IntelligenceIdentity and Access Management More security newsnewsWindows shortcut weaponized in Phorpiex-linked ransomware campaignResearchers revealed a Phorpiex-distributed phishing campaign using malicious LNK files to deploy Global Group ransomware designed to operate entirely offline.By Shweta Sharma Feb 10, 2026 4 minsCybercrimeMalwareRansomwarenewsSingle prompt breaks AI safety in 15 major language modelsThe GRP‑Obliteration technique reveals that even mild prompts can reshape internal safety mechanisms, raising oversight concerns as enterprises increasingly fine‑tune open‑weight models with privileged training access.By Gyana Swain Feb 10, 2026 6 minsArtificial IntelligenceGenerative AISecuritynewsAnthropic’s DXT poses “critical RCE vulnerability” by running with full system privilegesAnthropic didn’t dispute the security report, but suggested it would only be caused by user error, where users deliberately installed the tools and granted the appropriate permissions. By Evan Schuman Feb 9, 2026 8 minsArtificial IntelligenceSecurityVulnerabilitiesnewsOpenClaw integrates VirusTotal malware scanning as security firms flag enterprise risksThe AI agent platform has added a Google-owned threat intelligence service to the ClawHub marketplace, following the discovery of 341 malicious skills and shadow IT deployments.By Gyana Swain Feb 9, 2026 5 minsArtificial IntelligenceSecuritySecurity SoftwarenewsDKnife targets network gateways in long running AitM campaignActive since at least 2019, the China-linked framework operates at network gateways to inspect and manipulate in-transit traffic, allowing attackers to redirect updates, disrupt security tooling, and deliver backdoors.By Shweta Sharma Feb 9, 2026 4 minsNetwork SecuritySecurityopinionNever settle: How CISOs can go beyond compliance standards to better protect their organizationsCISOs can set a new standard in 2026 by proactively addressing new threats.By Chris Wheeler Feb 9, 2026 7 minsComplianceIT LeadershipSecurity PracticesopinionSchrödinger's cat and the enterprise security paradoxIf you haven’t really looked, your company is both secure and hacked at the same time — and dashboards alone won’t tell you which.By Dino Velusamy Feb 9, 2026 9 minsCybercrimeHackingThreat and Vulnerability ManagementnewsSix more vulnerabilities found in n8n automation platformFour of the holes, which allow remote code execution and command injection, are rated as critical.By Howard Solomon Feb 6, 2026 5 minsDevelopment ToolsSecurityVulnerabilitiesnewsClaude AI finds 500 high-severity software vulnerabilities Anthropic is reporting the flaws to developers — but only after having humans verify them.By Maxwell Cooter Feb 6, 2026 2 minsGenerative AIVulnerabilitiesZero-Day VulnerabilitiesnewsPretend Disk Format: PDFs harbor new dangersVirtual Hard Disks masquerading as PDF files are allowing hackers to sneak remote-access software through enterprise defenses. By Maxwell Cooter Feb 6, 2026 2 minsCybercrimeMalwareWindows SecuritynewsZscaler extends zero-trust security to browsers with SquareX acquisitionThe acquisition adds browser controls to Zscaler’s Zero Trust Exchange to protect against phishing, data leakage, and AI risks.By Nidhi Singal Feb 6, 2026 5 minsBrowser SecurityEndpoint ProtectionSecuritynewsFour new vulnerabilities found in Ingress NGINXTwo carry CVSS scores of 8.8, demanding that admins upgrade to the latest versions of the controller.By Howard Solomon Feb 5, 2026 4 minsNetwork SecuritySecurityVulnerabilities Show more Show less Video on demand video How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA What if you could stop cyberattacks before they happen? In this episode of Cyber Sessions, host Joan Goodchild sits down with Erin Whitmore, former CIA case officer and current Head of the CYNTURION Group for CYPFER, to discuss how her team uses intelligence and AI to anticipate and prevent attacks before adversaries strike. Whitmore reveals how proactive cybersecurity is blending human intuition, artificial intelligence, and offensive tactics to predict threats — while balancing the line between privacy and protection. By Joan Goodchild Feb 4, 2026 28 minsCyberattacksCybercrime Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan Goodchild Jan 13, 2026 23 mins CybercrimeSmall and Medium Business Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan Goodchild Dec 15, 2025 26 mins Application SecurityCSO and CISO CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan Goodchild Dec 10, 2025 27 mins CSO and CISOSecurity Infrastructure See all videos Explore a topicGenerative AIApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityView all topics The new era of IT innovation Articles Buyer’s Guide Emerging technologies from AI and quantum computing to extended reality, edge computing, digital twins, and more are at the forefront of innovation, poised to reshape how companies operate, compete, and deliver value in a rapidly evolving digital landscape. CIOs and their teams find it difficult to keep pace with emerging tech and to understand the provider landscape. This focus enables sponsors to share their strategies and offerings in new areas of keen interest to buyers. View all Popular topicsGenerative AI newsRoughly half of employees are using unsanctioned AI tools, and enterprise leaders are major culpritsBy Taryn Plumb Jan 29, 2026 6 minsArtificial IntelligenceData and Information SecurityGenerative AI newsCISA chief uploaded sensitive government files to public ChatGPTBy Gyana Swain Jan 29, 2026 5 minsData PrivacyGenerative AIPrivacy newsGoogle Vertex AI security permissions could amplify insider threatsBy Evan Schuman Jan 16, 2026 5 minsArtificial IntelligenceGenerative AIIdentity and Access Management View topic Cybercrime newsSubstack data breach leaks users’ email addresses and phone numbersBy John E. Dunn Feb 5, 2026 4 minsCyberattacksCybercrimeData Breach opinionBuilding trust with the board through evidence-based proofBy Joshua Brown Feb 5, 2026 6 minsCyberattacksCybercrimeData and Information Security newsThreat actors hijack web traffic after exploiting React2Shell vulnerabilityBy Howard Solomon Feb 4, 2026 4 minsCyberattacksCybercrimeVulnerabilities View topic Careers featureShould I stay or should I go?By Deb Radcliff Feb 4, 2026 9 minsC-SuiteCSO and CISOCareers interviewCSO Barry Hensley on staying a step ahead of the cyber threat landscapeBy Samira Sarraf Feb 2, 2026 8 minsCSO and CISOCareersInsurance Industry featureThe CSO guide to top security conferencesBy CSO Staff Jan 30, 2026 4 minsC-SuiteCSO and CISOEvents View topic IT Leadership opinionHow risk culture turns cyber teams predictiveBy Maman Ibrahim and Gavriel Schneider Feb 2, 2026 10 minsIT LeadershipRisk ManagementSecurity opinionOvercoming AI fatigueBy Jason Fruge Jan 27, 2026 7 minsArtificial IntelligenceData and Information SecurityIT Governance feature4 issues holding back CISOs’ security agendasBy Mary K. Pratt Jan 27, 2026 8 minsCSO and CISOIT LeadershipIT Strategy View topic In depth FeatureWho owns your data? SaaS contract security, privacy red flagsCompanies looking to use SaaS solutions should involve the security team in the procurement process and pay attention to contract language.By Andrada FiscuteanMar 27, 202410 mins Data and Information Security Read the Article Podcasts podcastsCyber Sessions with Joan GoodchildCybersecurity is constantly evolving, and so are the leaders who shape it. Hosted by veteran journalist Joan Goodchild, Cyber Sessions brings candid conversations with top CISOs, strategists, and industry influencers. Each episode cuts through the noise to explore the trends, challenges, and leadership insights that define the future of security.6 episodesSecuritySecurity Practices Ep. 06 How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan Goodchild Jun 28, 202328 mins CyberattacksCybercrime Ep. 06 Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan Goodchild Jun 28, 202323 mins CybercrimeSmall and Medium Business Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by Passwork Ten career-ending mistakes CISOs make and how to avoid them By Eirik Salmi, System Analyst at PassworkFeb 6, 202611 mins Security news Attackers exploit decade‑old Windows driver flaw to shut down modern EDR defenses By Shweta SharmaFeb 5, 20264 mins Endpoint ProtectionVulnerabilitiesWindows Security opinion The silent security gap in enterprise AI adoption By Karthikeyan KarunanithiFeb 5, 20268 mins Artificial IntelligenceData and Information SecurityRisk Management podcast How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime podcast Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business podcast CSO Executive Session ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity By Estelle QuekJan 11, 202628 mins CyberattacksCybercrimeHuman Resources video CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity By Estelle QuekJan 11, 202628 mins CyberattacksCybercrimeHuman Resources video CSO Executive Sessions Australia with Daisy Wong, Head of Security Awareness at Medibank Dec 14, 202538 mins CSO and CISO video The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management