top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


HPE: Only 5 Percent of Enterprises Are Ready for the Great Virtualization Reset
The enterprise virtualization market is entering a decisive moment. Years of incremental change have collided with rapid AI adoption, rising operational complexity, and unpredictable cloud economics. New research from Hewlett Packard Enterprise reveals that while most organizations know their virtualization strategy must evolve, very few are actually prepared to execute. According to the survey of nearly 400 global enterprises, more than two thirds plan to make material cha
Feb 10


AI Chat App Leak Exposes Hundreds of Millions of Private Conversations, Researcher Says
A widely downloaded mobile app called Chat & Ask AI has exposed what may be one of the largest known leaks of private AI chatbot conversations to date. An independent security researcher says the app left hundreds of millions of user messages publicly accessible online, including deeply sensitive and, in some cases, dangerous requests. Chat & Ask AI has surpassed 50 million installs across the Google Play Store and Apple App Store, positioning it as one of the most popular t
Feb 10


Volvo Group North America Hit by Data Exposure After Massive Conduent Breach Spreads Across Supply Chain
Volvo Group North America operates as the Swedish conglomerate’s commercial vehicle and industrial equipment arm across the United States, Canada, and Mexico. Its portfolio includes trucks, buses, construction equipment, engines, and industrial power systems, as well as iconic U.S. brands such as Mack Trucks. The group is separate from Volvo Cars, which produces consumer passenger vehicles. According to regulatory disclosures and customer notifications, attackers compromised
Feb 10


Jon David of NR Labs: Why Passing the Cybersecurity Pentest Can Still Get You Breached
We sat down with Jon David of NR Labs to challenge one of security’s most entrenched assumptions: that passing a pentest means you’re safer. Drawing on years of frontline breach response, David explains why traditional, vulnerability-centric testing no longer reflects how modern attackers actually operate, and why resilience today depends on understanding attack paths, identity abuse, and architectural weak points. David explores how organizations can move beyond compliance
Feb 10


RSAC Open Sources Quantickle, an AI-Built Graph Tool That Rethinks How Threat Analysts Work
The most interesting security tools do not always come from venture backed startups or vendor roadmaps. Sometimes they emerge from frustration. This week, the organization behind the RSA Conference released an open source project called Quantickle, a browser based graphing toolkit designed for analysts who spend their days untangling messy relationships between infrastructure, malware, and campaigns. It is not an enterprise platform and it is not trying to be one. Instead, i
Feb 9
bottom of page