top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


CISA and Global Cyber Agencies Push Identity-First Security Model for Agentic AI as Enterprise Risks Accelerate
A new wave of government-backed cybersecurity guidance is reshaping how enterprises approach agentic AI, warning that autonomous systems are rapidly evolving from passive tools into active participants inside corporate environments. The shift is forcing security leaders to rethink identity, accountability, and access control as foundational elements of AI governance. The guidance, developed in collaboration with international cyber agencies including CISA, NSA, and allied par
14 minutes ago


Cyber Risk Plateaus on the Surface While AI and Supply Chain Gaps Deepen, New UK Survey Finds
A new UK government study reveals a cybersecurity landscape that appears stable at first glance but is quietly becoming more complex and fragile beneath the surface. The latest findings from the UK Gov's Cyber Security Breaches Survey show that while the overall rate of reported cyber incidents has leveled off, structural weaknesses tied to third-party risk and rapid AI adoption are reshaping enterprise exposure. The report, commissioned by the Department for Science, Innovat
22 minutes ago


Criminal IP and Securonix Deepen Threat Intelligence Automation With ThreatQ Integration
Security teams are drowning in indicators but starving for context. A new partnership between Criminal IP and Securonix aims to change that by embedding exposure-based intelligence directly into the ThreatQ ecosystem, tightening the feedback loop between detection, investigation, and response. The integration brings Criminal IP’s external IP intelligence into ThreatQ’s centralized workflow engine, allowing analysts to enrich and prioritize threat data without leaving their ex
45 minutes ago


Disrupting the Attack Cycle: How Modern Adversaries Move from Belief to Targeting in a Data-Rich World
This guest article was contributed by Chuck Randolph, Chief Strategy Officer at 360 Privacy Enterprise security models have long assumed that attacks begin when an adversary starts collecting information about a target. That assumption made sense in an era when surveillance, casing, and reconnaissance were visible early indicators of hostile intent. Today, the earliest stages of many attacks occur long before any operational behavior is detectable. They begin when an individu
49 minutes ago


Intruder Unveils AI Pentesting Agents as Continuous Security Becomes a Requirement in the AI Era
As artificial intelligence accelerates both cyberattacks and defensive capabilities, security teams are facing a structural shift in how vulnerabilities are discovered and exploited. Intruder is betting that traditional penetration testing is no longer sufficient, launching a new AI-driven approach designed to operate continuously rather than periodically. The company’s newly announced AI Pentesting capability introduces autonomous agents that investigate and validate vulnera
1 day ago
bottom of page