Alabama IT Office Probing ‘Significant Security Breach’

The state of Alabama’s Office of Information Technology reported a significant security breach affecting systems statewide. The breach was uncovered on Friday night and involves compromised usernames and passwords of some state employees. Source: al.com Key Points A substantial security breach detected by Alabama’s Office of Information Technology on Friday night. Compromised usernames and passwords […]

Read More →

RSAC 2025: Agentic AI, Identity And The New Rules Of Cyber Defense

Summary As RSAC 2025 concludes, it embodies a transformative period in cybersecurity focusing on AI innovation and the critical role identity plays in defence strategies. The conference highlighted the shift from traditional perimeter-based security to identity-centric approaches, emphasising the urgent need for advanced AI systems capable of autonomous response to threats. Major companies like CrowdStrike […]

Read More →

Long Island school districts breached by cyber hackers — thousands of students’ records exposed in alarming trend

Over 20 school districts in Long Island have fallen victim to cyber hackers, resulting in more than 10,000 students’ records being compromised. This concerning trend has exposed vulnerabilities within the education sector, triggering alarms among cybersecurity experts. Key Points More than 28 incidents of data breaches were reported by Long Island school districts in the […]

Read More →

AI leads GovCon’s tech priorities despite challenges with market visibility

The 2025 edition of Deltek’s Clarity report emphasises that artificial intelligence (AI) is at the forefront of government contractors’ technology investments. Although contractors face obstacles in market visibility, AI remains the dominant area of focus as they navigate this uncertain phase with the new administration. Source: Washington Technology Key Points AI is highly prioritised for […]

Read More →

Review: Resilient Cybersecurity

Summary Mark Dunkerley’s book Resilient Cybersecurity offers a comprehensive look at enterprise cybersecurity, covering everything from threat detection to regulatory compliance. It is structured to guide readers through the process of building a robust cybersecurity programme, starting from awareness of the threat landscape to developing a long-term strategy. Dunkerley’s focus is not on technical minutiae […]

Read More →

Breaking down silos in cybersecurity

This article explores how silos in cybersecurity impede communication and collaboration, highlighting the challenges faced as organisations grow. With insights from Tyson Kopczynski, a cybersecurity expert, it delves into the common issues arising from differing priorities within and between teams, making a case for greater integration and change management to enhance security outcomes. Source: Help […]

Read More →

AI vs AI: How cybersecurity pros can use criminals’ tools against them

In the ever-evolving realm of cybersecurity, agentic AI is making waves, offering both opportunities and challenges. This article dives into how cybersecurity experts are flipping the script on cybercriminals by using their own tools against them, highlighting the critical role of AI and proxy technologies in safeguarding against emerging threats. Key Points Agentic AI can […]

Read More →

The 3 Masked Hackers Behind The World’s Most Prolific Cyberattacks

Summary The article delves into the clandestine world of cybercrime, spotlighting three notorious hacker groups that have dominated recent cyberattacks. This analysis draws on a report that explores over 1,500 cybercrime investigations, highlighting various threats and the resilience of these operators. The recurring rise of new threat actors amid law enforcement crackdowns underscores the evolving […]

Read More →

CISOs must speak business to earn executive trust

In a recent interview, Pritesh Parekh, VP and CISO at PagerDuty, dives into how Chief Information Security Officers (CISOs) can reshape their role and better connect with business leaders. He suggests that security shouldn’t be viewed as a hindrance to innovation but rather a catalyst for growth by integrating automation that aligns with business objectives. […]

Read More →