BankInfoSecurity.com
From Visibility to Action: Modernizing Security Operations with Cisco, Optiv, and Splunk
2 weeks 2 days ago
On Demand video from Cisco
As cyber threats grow more complex, organizations need security programs that work smarter, not harder. Hear how Optiv, Cisco, and Splunk combine strategy and technology to help security teams gain clarity, respond faster, and stay ahead of attackers.
As cyber threats grow more complex, organizations need security programs that work smarter, not harder. Hear how Optiv, Cisco, and Splunk combine strategy and technology to help security teams gain clarity, respond faster, and stay ahead of attackers.
Iranian Cyberthreats Test US Infrastructure Defenses
2 weeks 2 days ago
Experts Cite Prepositioning Risk in Iranian Cyber Operations Amid Escalating War
Warnings from Iranian-linked hacking groups targeting U.S. water systems highlight a growing risk of prepositioned cyber access and rapid attack activation, analysts told ISMG, as federal defenders confront rising geopolitical tensions and operational strain across critical infrastructure sectors.
Warnings from Iranian-linked hacking groups targeting U.S. water systems highlight a growing risk of prepositioned cyber access and rapid attack activation, analysts told ISMG, as federal defenders confront rising geopolitical tensions and operational strain across critical infrastructure sectors.
Oasis Raises $120M Series B to Safeguard Agentic Identities
2 weeks 2 days ago
CEO Danny Brickman on Intent-Based Access and Non-Human Identity Governance
Oasis Security has raised $120 million in a Series B round to expand its identity platform focused on non-human identities and AI agents. CEO Danny Brickman says enterprises need intent-based access controls and automated governance to securely scale agentic adoption.
Oasis Security has raised $120 million in a Series B round to expand its identity platform focused on non-human identities and AI agents. CEO Danny Brickman says enterprises need intent-based access controls and automated governance to securely scale agentic adoption.
National Cyber Resilience Demands Unified Defense
2 weeks 2 days ago
UK NCSC's Richard Horne on Strengthening Cyber Defense and Incident Response
Cyber risk is rising as digital dependence grows and threat actors expand. NCSC CEO Richard Horne outlines why leaders must treat cybersecurity as mission-critical, strengthen their resilience, and align defense efforts to counter ransomware, AI-driven threats, and supply chain attacks.
Cyber risk is rising as digital dependence grows and threat actors expand. NCSC CEO Richard Horne outlines why leaders must treat cybersecurity as mission-critical, strengthen their resilience, and align defense efforts to counter ransomware, AI-driven threats, and supply chain attacks.
AI Agents Redefine Enterprise Cybersecurity Risk
2 weeks 4 days ago
Menlo Ventures' Rama Sekhar on Securing AI Agents and Non-Human Identities
As AI evolves from assistants to autonomous agents, enterprises face a new attack surface driven by non-human identities. Rama Sekhar, partner at Menlo Ventures, explains why visibility, governance and AI-driven remediation are critical to securing this evolution.
As AI evolves from assistants to autonomous agents, enterprises face a new attack surface driven by non-human identities. Rama Sekhar, partner at Menlo Ventures, explains why visibility, governance and AI-driven remediation are critical to securing this evolution.
AI Versus AI: The Future of Cyber Defense
2 weeks 4 days ago
Segura's Joe Carson on Agentic AI, Cyber Resilience and Estonia's Lessons
AI is accelerating both attackers and defenders, transforming cybersecurity into an AI-versus-AI battle. Segura's Joe Carson discusses why organizations must treat agentic AI as a force multiplier, not a replacement, and how to harness it responsibly in a future driven by autonomous agents.
AI is accelerating both attackers and defenders, transforming cybersecurity into an AI-versus-AI battle. Segura's Joe Carson discusses why organizations must treat agentic AI as a force multiplier, not a replacement, and how to harness it responsibly in a future driven by autonomous agents.
Where AI Labs Will and Won't Disrupt Cybersecurity
2 weeks 4 days ago
Foundation Capital's Sid Trivedi on the Three Markets AI Labs Can't Easily Enter
AI labs are moving into application security, but three structural barriers define where they won't go, and that's where the next generation of durable security companies will be built, said Sid Trivedi, partner at Foundation Capital.
AI labs are moving into application security, but three structural barriers define where they won't go, and that's where the next generation of durable security companies will be built, said Sid Trivedi, partner at Foundation Capital.
AI Is Outpacing Enterprise Security Controls
2 weeks 4 days ago
Netskope's Sanjay Beri on Data Risk, Agent Visibility and Enabling AI Safely
AI adoption has outrun enterprise security, leaving data exposed and controls nonexistent. Sanjay Beri, co-founder and CEO at Netskope, says the answer isn't restriction. It's visibility, context and a culture of enablement.
AI adoption has outrun enterprise security, leaving data exposed and controls nonexistent. Sanjay Beri, co-founder and CEO at Netskope, says the answer isn't restriction. It's visibility, context and a culture of enablement.
How Connected Vehicles Expand Cyber Risk Surface
2 weeks 4 days ago
Car Hacking Village's Ghali on Automotive Security for AI-Driven Mobility Ecosystem
As vehicles evolve into connected, software-defined systems, cybersecurity risks now extend beyond the car itself. Kamel Ghali, vice president at Car Hacking Village, explains why threat modeling, AI safety and ecosystemwide visibility are critical in modern automotive security.
As vehicles evolve into connected, software-defined systems, cybersecurity risks now extend beyond the car itself. Kamel Ghali, vice president at Car Hacking Village, explains why threat modeling, AI safety and ecosystemwide visibility are critical in modern automotive security.
Why Startup Cyber Funding Boom Creates Execution Risks
2 weeks 4 days ago
Rain Capital's Lefort on Overcapitalization and Cybersecurity's Barbell Effect
Cybersecurity funding hit all-time highs in 2025, rivaling the 2021 boom, said Sidra Ahmed Lefort, venture partner at Rain Capital. A "barbell effect" has taken hold, with capital concentrating at the earliest and latest stages while squeezing the Series cB and C middle.
Cybersecurity funding hit all-time highs in 2025, rivaling the 2021 boom, said Sidra Ahmed Lefort, venture partner at Rain Capital. A "barbell effect" has taken hold, with capital concentrating at the earliest and latest stages while squeezing the Series cB and C middle.
How the AI Coding Boom Is Rewriting Application Security
2 weeks 4 days ago
Costanoa Ventures' John Cowgill on Moving From Static Analysis to Runtime Defense
Artificial intelligence-generated code is arriving faster than security teams can review it, and the risks are moving from the line level to the system level, says John Cowgill, partner at Costanoa Ventures.
Artificial intelligence-generated code is arriving faster than security teams can review it, and the risks are moving from the line level to the system level, says John Cowgill, partner at Costanoa Ventures.
Webinar | The Brass Ring of AppSec: Is AI Finally Making DAST to SAST Correlation Possible?
2 weeks 5 days ago
CISA Flags Critical Flaw in Grassroots DICOM Imaging Library
2 weeks 5 days ago
Researcher: If Exploited, Bug Could Crash Hospital Medical Imaging Systems
The Cybersecurity Infrastructure and Security Agency is warning of a high severity in Grassroots DICOM, an open-source library commonly used for medical imaging products, that if exploited could allow an attacker to send a specially crafted file resulting in a denial-of-service situation.
The Cybersecurity Infrastructure and Security Agency is warning of a high severity in Grassroots DICOM, an open-source library commonly used for medical imaging products, that if exploited could allow an attacker to send a specially crafted file resulting in a denial-of-service situation.
Google's 2029 Quantum Deadline Is a Wake-Up Call
2 weeks 5 days ago
Google's Accelerated PQC Timeline Demands Enterprise Action Now
Google set a public deadline for migrating to post-quantum cryptography, setting a strong signal for IT and security leaders that they too should transition their encryption into more robust algorithms. Enterprises need a migration strategy now before the window closes.
Google set a public deadline for migrating to post-quantum cryptography, setting a strong signal for IT and security leaders that they too should transition their encryption into more robust algorithms. Enterprises need a migration strategy now before the window closes.
US Treasury Weighs Cyber Insurance Backstop
2 weeks 5 days ago
Federal Review Questions Whether Private Insurers Can Absorb Cyber Losses
A Department of the Treasury review of cyber risk under the Terrorism Risk Insurance Program comes amid concern that nation-state attacks and systemic cyber events may overwhelm private insurers, raising the prospect of a federal backstop to protect critical infrastructure and economic stability.
A Department of the Treasury review of cyber risk under the Terrorism Risk Insurance Program comes amid concern that nation-state attacks and systemic cyber events may overwhelm private insurers, raising the prospect of a federal backstop to protect critical infrastructure and economic stability.
Europe Girds for Looming IoT Security Regulations
2 weeks 5 days ago
European Commission Publishes Draft Guidance for Cyber Resilience Act
Key implementation deadlines loom for one of Europe's most consequential cybersecurity laws and draft guidance from the European Union may help manufacturers comply - up to a point.
Key implementation deadlines loom for one of Europe's most consequential cybersecurity laws and draft guidance from the European Union may help manufacturers comply - up to a point.
AI-Based Threats Usher in 'Dark Period' for Cyber Defenders
3 weeks ago
NightDragon CEO Dave DeWalt on Perfect Storm of Risks, Attackers and Hybrid Warfare
Cybersecurity has entered a dark phase as AI-powered attackers outpace defense teams. Dave DeWalt of NightDragon outlines how hybrid warfare, critical infrastructure risks and rapid innovation are reshaping global security priorities.
Cybersecurity has entered a dark phase as AI-powered attackers outpace defense teams. Dave DeWalt of NightDragon outlines how hybrid warfare, critical infrastructure risks and rapid innovation are reshaping global security priorities.
CISA Forced Into 'Reactive' Cyber Posture Amid Shutdown
3 weeks ago
Acting Director Says Furloughs And Cuts Limit Proactive Cyber Defense
A prolonged Homeland Security department shutdown has sidelined much of the U.S. cyber defense agency, halting proactive cyber operations, delaying directives and weakening visibility into threats - conditions officials warn are increasing systemic risk across critical infrastructure.
A prolonged Homeland Security department shutdown has sidelined much of the U.S. cyber defense agency, halting proactive cyber operations, delaying directives and weakening visibility into threats - conditions officials warn are increasing systemic risk across critical infrastructure.
Why CISOs Need to Start Taking AI Third-Party Risk Seriously
3 weeks ago
Keyrock CISO David Cass on Managing Agentic AI Risk in Financial Services
As financial institutions accelerate AI adoption, traditional governance models are falling short. David Cass, CISO at Keyrock, explains why organizations must rethink accountability, asset visibility and identity controls to manage emerging risks from LLMs and agentic AI systems.
As financial institutions accelerate AI adoption, traditional governance models are falling short. David Cass, CISO at Keyrock, explains why organizations must rethink accountability, asset visibility and identity controls to manage emerging risks from LLMs and agentic AI systems.
Checked
13 hours 30 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed