SCWorld.com reported that “AI has been deployed faster than the industry can secure it. Whether it’s LLM-based assistants, GenAI-powered workflows, or agentic AI automating decisions, traditional security tooling was never designed for this. Firewalls, EDR, SIEM, DLP—none were built for models that hallucinate, systems that evolve, or

Continue Reading Do you need good advice on how to fix security issues caused by AI?

DarkReading.com reported that “Economic indicators in the cybersecurity sector are leading some industry observers to conclude that mass layoffs are on the way in the US. But boards should beware: All those pink slips come with a hidden cost.”  The May 14, 2025 article entitled “Infosec Layoffs Aren’t the Bargain

Continue Reading Cybersecurity risks on the increase with infosec layoffs!

SCWorld.com reported that “In a May 21 settlement, the Federal Trade Commission (FTC) reached an agreement with GoDaddy to settle allegations that the popular webhosting provider misled its customers by failing to implement data security protections, practices that led to multiple data breaches.”  The May 22, 2025 article entitled

Continue Reading GoDaddy agrees to implement standard data security to protect websites and data!

CSOonline.com reported that “The smartphone revolution was supposed to provide a second chance for the tech industry to roll out a secure computing platform. These new devices were purported to be locked down and immune to malware, unlike buggy PCs and vulnerable servers.”  The May 15, 2025 article entitled ”

Continue Reading Watch out!! – here are 7 common attack methods directed to your smartphone!

CSOonline.com reported that “According to a survey of more than 2,000 cybersecurity executives by security provider Trend Micro, nearly three-quarters (73%) of security leaders say they have experienced a security incident because assets in their IT infrastructure were not managed or simply unknown.”  The May 12, 2025 article entitled

Continue Reading 73% of CISOs admit that unmanaged IT infrastructure leads to security incidents!

refers to systems designed to plan, decide, and act on their own within set goals. Instead of waiting for instructions, they proactively complete tasks — sometimes chaining together multiple steps — and adapt to changing conditions without micromanagement.”  The May 5, 2025 article entitled ” Agentic AI took over the

Continue Reading No surprise that Agentic AI is in the middle of Cybersecurity!

Verizon.com issued it 2025 Data Breach Investigations Report starting with “Today’s threat landscape is shifting. Get the latest updates on real-world breaches and help safeguard your organization from cybersecurity attacks.”  The 2025 Data Breach Investigations Report (https://www.verizon.com/business/en-gb/resources/reports/dbir/) included these “Top Takeaways:”

*30% of breaches were linked to third-party

Continue Reading  No surprises in the annual Verizon 2025 Data Breach Investigations Report!

Computerworld.com reported that “Upcoming generative AI features in unified endpoint management tools have the potential to bring new efficiencies and insights — but also to wreak havoc with enterprise systems and employee devices. Here’s how IT leaders can prepare. Generative artificial intelligence (genAI) capabilities and features are coming to unified

Continue Reading Get ready for GenAI on your UEM (Unified Endpoint Management) platform!