top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


CrackArmor Flaws in Linux AppArmor Expose Millions of Systems to Root-Level Attacks
A newly disclosed set of vulnerabilities in the Linux AppArmor security module could allow attackers to escalate privileges to root, potentially undermining security protections across millions of enterprise systems. The flaws, collectively dubbed “CrackArmor,” were uncovered by the Qualys Threat Research Unit and affect Linux environments where AppArmor is enabled by default, including Ubuntu, Debian, and SUSE deployments. According to researchers, the issue stems from a de
Mar 12


Cyberattack Disrupts Medical Device Giant Stryker as Experts Warn of Escalating Geopolitical Cyber Conflict
A cyberattack that crippled systems at medical device manufacturer Stryker has triggered concern among cybersecurity researchers and policymakers, raising new questions about how geopolitical tensions are spilling into corporate networks. The incident came to light after employees across multiple regions reported that company-issued laptops, phones, and computers had suddenly been wiped of data. Workers in the United States, Ireland, Australia, and India were locked out of c
Mar 12


Kai Raises $125 Million to Launch Agentic AI Cybersecurity Platform Built for Machine-Speed Defense
A new cybersecurity startup is betting that the next phase of digital defense will be driven by autonomous AI systems rather than human analysts managing endless security alerts. San Jose based startup Kai announced it has raised $125 million in funding and is emerging from stealth with an agentic AI platform designed to operate cybersecurity defenses at machine speed. The round was led by Evolution Equity Partners with participation from N47 and other strategic investors. T
Mar 10


Open Source Dependency Risks Are Becoming One of the Biggest Security Threats in Modern Software
Open source software powers nearly every modern application. From small startups to global enterprises, developers rely on open source libraries to build products faster and reduce development costs. But security researchers say that same ecosystem is now one of the largest and fastest growing sources of risk in the software supply chain. Industry data from Secure shows that more than 84 percent of codebases contain at least one open source vulnerability. On average, applica
Mar 10


Part 2: International Women’s Day Highlights the Growing Influence of Women in Technology and AI
This is part 2 of our International Women's Day cyber series. Read part 1 here . As artificial intelligence transforms nearly every sector of the economy, the conversation around who designs, builds, and governs these systems has taken on new urgency. Across enterprise technology, cybersecurity, and digital innovation, women leaders say the next phase of technological progress will depend not only on new tools but on who shapes them. Jessica Hammond, Senior Director of Produ
Mar 9


Part 1: How Women in Cybersecurity See the Industry’s Next Era of Leadership
This International Women’s Day, leaders across cybersecurity and enterprise technology say the future of the industry depends on expanding the influence of women across technical, strategic, and executive roles. Their voices reflect a growing recognition that the field’s next phase of innovation will require broader perspectives and leadership pipelines. For Maria Cardow, Chief Information Officer at LevelBlue , cybersecurity’s success depends on recognizing that the field is
Mar 6
bottom of page