CEO insights: beyond the AI model card
As part of our AI series, I recently released a blog on the topic of keeping the human layer sacred in the AI era. There, I shared my thoughts on where human intelligence fits, the decisions I…
As part of our AI series, I recently released a blog on the topic of keeping the human layer sacred in the AI era. There, I shared my thoughts on where human intelligence fits, the decisions I…
Editor’s note: This article was originally published by Craig Riddell on LinkedIn. It has been republished here with the author’s permission. Boards are giving AI…
Earlier this month, ShinyHunters breached Instructure’s Canvas platform twice within a single week — stealing 3.65 terabytes of data from approximately 275 million users across…
Aon has appointed Quinton Kotze as head of cyber solutions in Australia, as organisations face increasing cyber risk and a tightening market for cyber insurance…
When Matt Schlicht built Moltbook, the social network where AI agents talk to one another, he didn’t write the code himself. He “just had a…
U.S. officials are investigating a series of cyber intrusions targeting automatic tank gauge systems used to monitor fuel levels at gas stations across multiple states,…
Global technology company ABB and Cydome, provider of purpose-built cybersecurity, announced their collaboration to help shipping companies strengthen risk management and support safer operations. By…
We could take a note or two on what agility means from our adversaries, aka threat actors. Something doesn’t work? Plan B is ready. Password…
Microsoft has confirmed that the May 2026 Windows 11 security update (KB5089549) fails to install on some systems and triggers 0x800f0922 errors. This known issue…
CISA has issued a fresh warning about a newly disclosed Microsoft Exchange Server vulnerability that is already being exploited in real-world attacks, raising concerns for…
A newly analyzed cyber-espionage framework called Fast16 has revealed one of the most precise and covert sabotage operations ever uncovered targeting nuclear weapons simulations by…
Enterprises deploying LLMs have spent the past two years building defenses around a reasonable assumption: malicious behavior leaves a trace in the input. Scan for…