top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Cynomi Launches AI-Powered CISO Agents to Help MSPs Scale Cybersecurity Services and Revenue
Cynomi is betting that the future of managed cybersecurity services will not be built on hiring more senior talent, but on embedding that expertise directly into software. The Boston and Tel Aviv–based company recently unveiled a major expansion of its platform, introducing a new layer of AI-driven “CISO Intelligence” agents designed to help managed service providers automate and scale security operations, advisory, and client delivery. The move reflects a broader shift acro
Apr 8


Why the Network is the Deciding Factor Between Public Cloud and Repatriation
This guest post was contributed by Cameron Daniel, CTO of Megaport For more than two decades, alongside the growth of modern SaaS and elastic compute, the public cloud was seen as the inevitable destination for enterprise workloads. The conversation has since evolved into a nuanced discussion about placement. Data shows that many IT leaders are now looking at their cloud environments through a more critical lens, weighing the benefits of hyperscale agility versus the secur
Apr 8


Cyber Industry Reacts to Anthropic's Project Glasswing as AI Accelerates the Race to Secure Software
A coalition of the world’s largest technology companies is betting that artificial intelligence can tip the balance in cybersecurity before attackers fully weaponize it. Anthropic this week unveiled Project Glasswing , a coordinated effort with industry heavyweights including Amazon, Apple, Microsoft, Cisco, CrowdStrike, Broadcom, Palo Alto Networks, and the Linux Foundation. The initiative centers on a new AI system called Claude Mythos Preview, a model designed to uncover d
Apr 8


Iran-Linked Hackers Target U.S. Water and Energy Systems Through Exposed Industrial Controllers
Federal cybersecurity agencies are warning that Iran-affiliated hackers are actively exploiting weaknesses in the industrial control systems that underpin America’s water and energy infrastructure, signaling a renewed focus on operational disruption rather than simple espionage. In a joint advisory released , a coalition that includes the Cybersecurity and Infrastructure Security Agency, National Security Agency, Federal Bureau of Investigation, U.S. Cyber Command, Department
Apr 8


Cyberattacks Now Start Before the Breach: Lumen Report Reveals AI-Driven Threat Infrastructure Surge in 2026
A new cybersecurity report from Lumen signals a fundamental shift in how cyberattacks are built, scaled, and executed. The findings suggest that by the time most organizations detect an intrusion, the real operation has already been underway for days or even weeks. According to the Lumen Defender Threatscape Report 2026 , attackers are no longer focused solely on breaching endpoints. Instead, they are investing heavily in building and rotating infrastructure at scale, using
Apr 7


Attackers Aren’t Breaking In Anymore. They’re Logging In. Inside the Identity-Driven Cyber Threat Surge of 2025
The defining cybersecurity story of late 2025 is not about zero-days or sophisticated exploits. It is about access. Attackers are no longer forcing their way into networks. They are signing in. According to new threat intelligence report by Ontinue , the industry has crossed a structural tipping point where identity has become the central battleground. Credentials, tokens, and machine identities now function as both the entry point and the control layer for modern attacks, f
Mar 31
bottom of page