top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Transforming Industrial Cybersecurity: Closing the Gaps Compliance Leaves Behind
This article was contributed by Dr. Jerome Farquharson, Managing Director and Senior Executive Advisor, Arcova Critical infrastructure operators have made measurable progress in strengthening cybersecurity through regulatory frameworks such as NERC CIP for electric power systems, TSA’s pipeline directives, and the EPA’s guidance for water utilities. These standards have helped sharpen accountability and increase the baseline of operational protection. However, regulation als
Apr 13


Cynomi Launches AI-Powered CISO Agents to Help MSPs Scale Cybersecurity Services and Revenue
Cynomi is betting that the future of managed cybersecurity services will not be built on hiring more senior talent, but on embedding that expertise directly into software. The Boston and Tel Aviv–based company recently unveiled a major expansion of its platform, introducing a new layer of AI-driven “CISO Intelligence” agents designed to help managed service providers automate and scale security operations, advisory, and client delivery. The move reflects a broader shift acro
Apr 8


Attackers Aren’t Breaking In Anymore. They’re Logging In. Inside the Identity-Driven Cyber Threat Surge of 2025
The defining cybersecurity story of late 2025 is not about zero-days or sophisticated exploits. It is about access. Attackers are no longer forcing their way into networks. They are signing in. According to new threat intelligence report by Ontinue , the industry has crossed a structural tipping point where identity has become the central battleground. Credentials, tokens, and machine identities now function as both the entry point and the control layer for modern attacks, f
Mar 31


Citrix NetScaler Flaw CVE-2026-3055 Moves From Reconnaissance to Active Exploitation, Security Firms Warn
A critical vulnerability in Citrix NetScaler appliances is rapidly escalating from early reconnaissance into active exploitation, according to multiple security researchers tracking activity in the wild. The flaw, tracked as CVE-2026-3055, exposes enterprise systems to sensitive data leakage and is already drawing attention from threat actors probing internet-facing infrastructure. Security researchers at Defused Cyber and watchTowr report that attackers initially began by
Mar 31


Argenbright Security Adopts Totalmobile Platform to Modernize Workforce Operations Across UK
Argenbright Security Europe Ltd is overhauling how it manages frontline personnel, selecting Totalmobile ’s Field First Platform in a move that reflects a broader shift across the security industry toward real-time, data-driven workforce coordination. The London-based security provider said the decision followed mounting operational strain from legacy systems that could no longer keep pace with modern demands. As security teams increasingly deal with unpredictable call-outs,
Mar 26


Strava Data Leak Exposes French Aircraft Carrier Location, Raising Fresh Concerns Over Military OPSEC
A routine fitness upload has once again exposed the hidden risks of consumer apps in sensitive environments. This time, the unintended disclosure involved one of Europe’s most important naval assets, surfacing at a moment of heightened geopolitical tension in the Middle East. According to a report by Le Monde, a French naval officer onboard the aircraft carrier Charles de Gaulle publicly shared a workout on the fitness platform Strava, inadvertently revealing the vessel’s nea
Mar 23
bottom of page