top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Pocket Tricksters: How Cheap BLE LED Masks Can Be Remoted and Reprogrammed on Halloween
This Halloween, a cheap LED party mask could do more than make you glow — it might let a stranger a few yards away swap your grin for a fox, a pumpkin, or whatever image they please. Security researchers at Bishop Fox have turned a seasonal gadget into a case study in how anecdotally safe — but technically sloppy — consumer electronics can become a live demo of insecure-by-design Internet-of-Things. Their work shows that numerous Bluetooth Low Energy (BLE) LED masks, many of
Oct 30, 2025


Bitsight Unveils Cyber Risk Command Center to Give CISOs a Unified View of Digital Exposure
In an era when threat surfaces stretch across cloud environments, suppliers, and shadow IT, Bitsight is betting that visibility—not just data—is the key to faster, smarter defense. The company today launched its Cyber Risk Command Center , a centralized intelligence hub designed to give CISOs and executives a single, actionable view of their organization’s cyber posture. “Security leaders are under immense pressure to make fast, strategic decisions in an increasingly complex
Oct 30, 2025


AI, Identity, and the Trust Gap: Keeper Security’s Global Survey Exposes the Reality Behind Zero-Trust Readiness
In a year when artificial intelligence has redefined both the promise and peril of cybersecurity, a new report from Keeper Security reveals how far most enterprises still are from turning awareness into action. Drawing insights from more than 370 cybersecurity professionals across Infosecurity Europe, Black Hat USA, and it-sa Germany, the report — “Identity, AI and Zero Trust: Cybersecurity Perspectives” — paints a vivid picture of practitioners struggling to keep pace with
Oct 30, 2025


Weaponizing Trust: Attackers Exploit WSUS Flaw in Wave of Post-Patch Intrusions
When Microsoft disclosed a critical flaw in its Windows Server Update Services (WSUS) platform earlier this month, few expected the exploit to escalate this quickly—or this creatively. Just days after the company’s out-of-band fix was released on October 23, attackers began weaponizing the vulnerability, designated CVE-2025-59287 , to infiltrate enterprise environments and hijack the very infrastructure meant to distribute trusted software updates. The Darktrace Threat Resea
Oct 30, 2025


OpenText Pushes AI-Ready Cybersecurity Forward With Unified, Governed Defenses
OpenText is betting that the future of enterprise security won’t be about adding more point solutions—but about fusing artificial intelligence directly into the heart of cybersecurity operations. The company unveiled new capabilities in its latest Cloud Editions 25.4 release this week, positioning itself as a key player in secure information management for AI-driven enterprises. From AI Velocity to AI Governance As organizations rush to embed generative and autonomous system
Oct 29, 2025


Corsha and Dragos Join Forces to Bring Machine Identity and Threat Intelligence to the Heart of OT Security
In an era where industrial systems are more connected than ever, Corsha and Dragos are teaming up to close one of operational technology’s most dangerous security gaps: the unverified machine-to-machine chatter that fuels modern cyberattacks. Today, Corsha , the self-described first Machine Identity Provider (mIDP) built specifically for machine-to-machine (M2M) communication, announced a new integration with Dragos , the global OT cybersecurity leader. The partnership aims t
Oct 29, 2025
bottom of page