Aggregator
Cybersecurity M&A Is Surging as AI Reshapes the Market
Large funding rounds are concentrating on fewer cybersecurity startups as artificial intelligence accelerates product development. Momentum Cyber CEO Eric McAlpine shares why investors are backing AI-native startups earlier and how it is reshaping growth and competition in cybersecurity M&A.
Turning Security Operations Over to AI Requires Trust
AI adoption is accelerating, but security leaders now demand proof of effectiveness and trust. Arctic Wolf CEO Nick Schneider explains why visibility, data evidence and human oversight are critical to ensure AI delivers reliable outcomes in cybersecurity operations.
AI-Based Coding Redefines Software Development
Coding agents that once struggled below the surface level of basic web development can now refactor decades-old enterprise code at a speed and scale far beyond traditional teams, says Cisco's Jeetu Patel. He explains how AI-built software and machine-scale defense redefine competitive advantage.
Beyond Intel Sharing: The Push Toward Cyber Disruption
Sharing threat intelligence is no longer enough - the cybersecurity industry must operationalize it through coordinated takedowns and active disruption, says Sandra Joyce, vice president at Google Threat Intelligence.
嘶吼安全动态|国家数据局:我国AI日均Token调用量破140万亿 LiteLLM遭供应链投毒,数千企业面临数据泄露风险
Trivy漏洞扫描器遭入侵,攻击者通过GitHub Actions分发窃密恶意软件
从假新闻刷屏看清“认知安全”:AI时代网络安全的新边疆
CSIRTs Around the World – Azerbaijan
You don’t have to choose between BAS or automated pentesting, you shouldn’t
There’s a debate making the rounds in security circles that sounds reasonable on the surface but falls apart under operational scrutiny: Which is better, breach and attack simulation (BAS) or automated penetration testing (APT)? Security vendors have stoked this debate for obvious reasons, with some even explicitly arguing that automated pentesting should replace BAS entirely. But for practitioners responsible for defending an organization, this framing is the problem. It represents a coverage regression disguised as … More →
The post You don’t have to choose between BAS or automated pentesting, you shouldn’t appeared first on Help Net Security.
Epic Games 裁员逾千人,强调与 AI 无关
Первая «Кремниевая долина» Европы: почему 400 тыс лет назад люди отказались от разнообразия камней ради одного идеального лезвия
Why your phishing simulations aren’t building a security culture
Security culture isn’t built by phishing simulations. In this Help Net Security video, Dan Potter, VP of Cyber Resilience at Immersive, argues that annual training videos and quarterly phishing tests happen in calm, controlled settings that tell us nothing about how people perform when a real incident hits. Real attacks trigger anxiety, cognitive narrowing, and hesitation. People fixate on the loudest problem in the room, lose sight of the bigger picture, and slow down when … More →
The post Why your phishing simulations aren’t building a security culture appeared first on Help Net Security.
CVE-2025-31277
Как заставить нейросеть удалить всё лишнее (и нужное тоже)? Разбираемся в «токсичных потоках»
Your security stack looks fine from the dashboard and that’s the problem
One in five enterprise endpoints is operating outside a protected and enforceable state on any given day, according to device telemetry collected across tens of millions of corporate PCs. That figure, drawn from Absolute Security’s 2026 Resilience Risk Index, has barely moved in a year, even as organizations continue to add security tools and increase spending. The report, which draws on multi-year endpoint telemetry alongside external research, finds that the gap between security deployment and … More →
The post Your security stack looks fine from the dashboard and that’s the problem appeared first on Help Net Security.