How can company boards ensure they are addressing escalating cyber threats? Positioned at opposite ends of the business, board members and security executives often struggle to collaborate effectively ...
With the Federal Reserve Chairman meeting with bank CEOs to discuss the security implications of Claude Mythos, you can bet that your board of directors will ask you about the impact of the AI model ...
Described by OpenAI as a new model tuned for defensive cybersecurity tasks, GPT-5.4-Cyber is being offered first to vetted ...
Intelligence officials and industry are weighing how Claude Mythos Preview could reshape hacking and cyberdefense. The ...
When an advisory firm is seeking a tech vendor or vetting an existing one, the most common request is to see its SOC 2 report — a widely used compliance report that shows how that vendor manages ...
In a move to prevent public companies from delaying news about cyberattacks, the US Security and Exchange Commission has set ...
No business sector is immune from the threat of a cyber attack. Scattered Spider is just one example of an organized group that has initiated attacks within different industries, including two US ...
With the top U.S. cybersecurity official making her exit and the incoming administration’s next move anyone’s guess, one legal expert is urging cyber insurance policyholders to ensure their coverage ...
There is bipartisan support to fund the Energy Department’s new cybersecurity office, but some on Capitol Hill want more tangibles. The new Office of Cybersecurity, Energy Security, and Emergency ...
In January of this year I was prompted by Microsoft’s admission of a successful attack by Russia-backed hacking group Midnight Blizzard, (also known as APT29 or Cozy Bear) to create a list of five ...
Coordinated U.S. and Israeli strikes on Iranian targets on February 28 have created a familiar but still dangerous pattern for homeland security leaders. Iran has a documented history of responding to ...