The CSO role is evolving fast with AI in Cyber Defense strategy
11
Mar
2026

The CSO role is evolving fast with AI in Cyber Defense strategy

AI and cybersecurity are proving to be extremely challenging for organisations. AI is a double-edged sword – as used by…

Julian Herlinghaus
11
Mar
2026

AWS European Sovereign Cloud achieves first compliance milestone: SOC 2 and C5 reports plus seven ISO certifications

In January 2026, we announced the general availability of the AWS European Sovereign Cloud, a new, independent cloud for Europe…

The Expanding Role of Threat Intelligence in Executive Protection
11
Mar
2026

The Expanding Role of Threat Intelligence in Executive Protection

The New Risk Equation: When Cyber Becomes Physical The boundary between cyber and physical threats has blurred in ways that…

Active Exploitation of Gladinet CentreStack and Triofox Local File Inclusion Flaw
11
Mar
2026

Active Exploitation of Gladinet CentreStack and Triofox Local File Inclusion Flaw

Update #1: 10/15/25 @ 1pm ET On October 14, Gladinet released version 16.10.10408.56683 of CentreStack, which includes a fix for…

Hewlett Packard Enterprise HPE
10
Mar
2026

HPE warns of critical AOS-CX flaw allowing admin password resets

Hewlett Packard Enterprise (HPE) has patched multiple security vulnerabilities in the Aruba Networking AOS-CX operating system, including several authentication and…

Fortinet FortiManager fgtupdates Vulnerability Allows Attackers to Execute Malicious Commands
10
Mar
2026

Fortinet FortiManager fgtupdates Vulnerability Allows Attackers to Execute Malicious Commands

Fortinet has disclosed a high-severity stack-based buffer overflow vulnerability in its FortiManager platform that could allow remote unauthenticated attackers to…

Woolworths' AI customer problem-solving a question of semantics
10
Mar
2026

Woolworths’ AI customer problem-solving a question of semantics

Woolworths is introducing semantic search capabilities into its online shopping portal to catch a trend that is seeing consumers increasingly…

Attackers exploit FortiGate devices to access sensitive network info
10
Mar
2026

Attackers exploit FortiGate devices to access sensitive network info

Attackers exploit FortiGate devices to access sensitive network information Pierluigi Paganini March 10, 2026 Attackers are exploiting FortiGate devices to…

The Culture Series: A Complete Guide to Glanding
10
Mar
2026

The Culture Series: A Complete Guide to Glanding

[![The Culture Series: A Complete Guide to Glanding](/images/blog/the-culture-series-complete-guide-to-glanding/header.webp)](/images/blog/the-culture-series-complete-guide-to-glanding/header.webp) In Iain M. Banks’ [Culture series](https://en.wikipedia.org/wiki/Culture_series), citizens have a genetically engineered organ…

Microsoft’s monthly Patch Tuesday is first in 6 months with no actively exploited zero-days
10
Mar
2026

Microsoft’s monthly Patch Tuesday is first in 6 months with no actively exploited zero-days

Microsoft addressed 83 vulnerabilities that cut across its broad portfolio of enterprise software and underlying services in its latest security…

Threat intelligence by ESET is a game changer
10
Mar
2026

Threat intelligence by ESET is a game changer

Cyber threats have gained the upper hand on many global organizations, attacking through a relentless cycle of new phishing scams,…

10
Mar
2026

The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors

Update: 10/15/25 @ 1pm ET An anonymous individual from Mainland China who is said to be familiar with the activity,…