Anamarija Pogorelec
New infosec products of the week: September 12, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Cynomi, DataLocker, Gigamon, Lookout, and Relyance AI. Cynomi simplifies vendor risk …
AI is everywhere, but scaling it is another story
AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say orchestration is the key to scaling AI. They …
Why organizations need a new approach to risk management
To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk ownership.” This is a future state where business …
CISOs, stop chasing vulnerabilities and start managing human risk
Breaches continue to grow in scale and speed, yet the weakest point remains unchanged: people. According to Dune Security’s 2025 CISO Risk Intelligence Survey, over 90 percent …
Signal adds secure backup option for chat history
Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The …
Employees keep feeding AI tools secrets they can’t take back
Employees are putting sensitive data into public AI tools, and many organizations don’t have the controls to stop it. A new report from Kiteworks finds that most companies are …
Cybersecurity jobs available right now: September 9, 2025
Analyst, Cybersecurity DFIR ICE | Singapore | On-site – No longer accepting applications As an Analyst, Cybersecurity DFIR, you will review and triage user-reported …
Identity management was hard, AI made it harder
Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven …
AI moves fast, but data security must move faster
Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and …
File security risks rise as insiders, malware, and AI challenges converge
Breaches tied to file access are happening often, and the costs add up quickly. Many organizations have faced multiple file-related incidents over the last two years, with …
New threat group uses custom tools to hijack search results
ESET Research has identified a new threat group called GhostRedirector. In June 2025, this group broke into at least 65 Windows servers, mostly in Brazil, Thailand, Vietnam, …
Complexity and AI put identity protection to the test
Identity has become a core pillar of cybersecurity strategy. Remote work, cloud-first adoption, and distributed supply chains have moved identity from “a tactical IT …
Featured news
Resources
Don't miss
- The 2026 State of Pentesting: Why delivery and follow-through matter more than ever
- Initial access broker pleads guilty to selling access to 50 corporate networks
- Confusion and fear send people to Reddit for cybersecurity advice
- Product showcase: PrivacyHawk for iOS helps users track and remove personal data from data brokers
- Fake browser crash alerts turn Chrome extension into enterprise backdoor