top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


The Non-Human Identity Explosion: Why Security Teams Must Rethink Trust
This guest article was contributed by Alix Melchy, VP of AI at Jumio In modern enterprise environments, the users you fear most gaining access to your systems may not be people at all. From autonomous bots to AI agents and machine-generated tokens, non-human identities (NHIs) are becoming embedded across enterprise operations. Agentic AI is seeing explosive growth, with 79% of organizations already adopting it and the market set to hit over $199 billion by 2034 . These mach
Jan 19


Stolen Credentials, Not Zero Days: How a Tennessee Hacker Breached Supreme Court Systems and Bragged on Instagram
A Tennessee man has admitted to repeatedly breaching some of the federal government’s most sensitive digital systems, a case that underscores how fragile legacy authentication practices remain even at the highest levels of U.S. institutions. Court records show that 24 year old Nicholas Moore of Springfield, Tennessee, pleaded guilty on Friday to unlawfully accessing the U.S. Supreme Court’s electronic filing system more than two dozen times. Prosecutors say the intrusions oc
Jan 19


Alleged Target Source Code Leak Puts Retailer’s Internal Systems in the Crosshairs
Cybercriminals are attempting to sell what they claim is a massive cache of internal source code linked to Target, igniting fresh concern over how quietly sensitive development systems can be exposed without triggering alarms. The episode surfaced after a previously unknown threat actor posted on a well known underground forum, advertising what was described as sensitive development files allegedly taken from the US retail giant. To bolster the claim, the actor briefly publi
Jan 13


2026: The Year Cybersecurity Becomes Autonomous
This guest article was contributed by Scott Richards, SVP of AI & Discovery and Cybersecurity at OpenText Enterprises are under growing security pressure in 2026. Data volume continues to multiply. Identity sprawl is expanding across hybrid and cloud environments. Threat actors increasingly use AI to find new attack vectors. And at the same time, AI powered security tools have matured and can now provide context aware, automated protection rather than alarm overload. This cre
Jan 13


Presidio Unveils AI-Driven Adaptive Cloud Services to Rethink Managed Cloud on AWS
Presidio is betting that the next phase of cloud services will look less like a fixed contract and more like a living system that adjusts as customers grow, spend, and secure their environments. Presidio has introduced Adaptive Cloud Services, a new portfolio of AI-enhanced offerings built on Amazon Web Services that is designed to scale in step with an organization’s maturity rather than forcing customers into an all-or-nothing managed services model. Cloud adoption has rea
Jan 13


Commvault Targets S3 Backup Sprawl With Agentless, Air-Gapped Cloud Data Vault
Commvault is making a direct play for one of the messiest corners of modern cloud infrastructure: the sprawl of S3-based backups quietly accumulating across enterprise environments. The data protection company announced a new cloud-native service called Commvault Cloud Unified Data Vault , aimed at bringing structure, immutability, and policy control to data written via the S3 protocol. The offering extends Commvault’s air-gapped resilience model to S3-compatible workloads,
Jan 13
bottom of page