top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Inside the First Alleged AI-Orchestrated Espionage Campaign: How Hackers Turned Claude into an Autonomous Cyber Weapon
Anthropic’s revelation that hackers linked to China allegedly used its Claude AI system to automate attacks against roughly 30 organizations has ignited one of cybersecurity’s most polarizing debates yet: can artificial intelligence truly orchestrate espionage on its own—or is this another case of overhyped “AI panic” masking a deeper failure of model governance? The Rise of the AI Operator According to Anthropic, the attackers disguised themselves as cybersecurity researcher
Nov 14


When Big-Data Meets SIEM: How Securonix is Rewriting the Data Ingestion Rulebook
In the fast-moving world of cybersecurity operations, the tension between ingesting more telemetry and keeping budgets under control has become acute. For years, organizations have felt forced into a trade-off: either accept spiraling data-storage costs or curtail log ingestion and risk creating blind spots. Enter Securonix’s newly launched Data Pipeline Manager (DPM) with its “Flex Consumption” model—a move that aims to flip that script. A Shift in the SIEM Economics Based
Nov 12


Manifest and NetRise Unite to Illuminate Firmware’s Blind Spot in Supply Chain Security
For years, even the most mature software supply chain security programs have had a glaring blind spot — firmware. The low-level code running beneath operating systems on routers, MRI machines, industrial controllers, and countless other devices has remained largely opaque to security teams. That changes with a new partnership between Manifest and NetRise , promising what the companies call the first unified, end-to-end view of software and firmware risk. Closing the Loop Bet
Nov 12


Building Vendor Trust in an Age of Digital Risk
In this exclusive Q&A, Ngaire Guzzetti, Technical Director at CyXcel , discusses the widening trust gap between enterprises and their vendors—and why it’s putting resilience on the line. From fragmented oversight to the rise of AI-driven threats, Guzzetti unpacks how organizations can rebuild trust, strengthen accountability, and modernize risk management in an increasingly interconnected world. Your recent research found that a third of U.S. risk managers don’t fully trust t
Nov 10


Cl0p’s Oracle Breach Exposes a Dangerous New Phase of Enterprise Extortion
The criminal syndicate behind some of the world’s most devastating file-transfer breaches has moved on to a new, more complex prize: Oracle’s E-Business Suite (EBS). Nearly 30 global organizations—including Harvard University, The Washington Post, and industrial heavyweight Schneider Electric—have now appeared on Cl0p’s leak site following a sophisticated campaign exploiting critical zero-day vulnerabilities in Oracle’s ERP software. A Familiar Name, a Sharper Strategy The ca
Nov 10
bottom of page