Anthropic disclosure of several AI-powered security threats, including a ransomware development operation, shows how even non-technical users can now build and launch attacks.
Cyber Security
Anthropic uses actual attacks against its own software to lay out specific ways that threat actors are leveraging AI to further their goals. Report serves as a troubling call to action for vendors, partners, and customers.
With two separate initiatives, Microsoft is bolstering its Defender platform with agentic AI to help security and ops teams combat two high-volume threats that can overwhelm humans.
Microsoft’s lagging security strategy and customer dissatisfaction open the door for Google Cloud to accelerate growth and challenge Microsoft’s leadership in the enterprise cloud market.
If Identity and Access Management (IAM) software goes down, business continuity takes a big hit. HYCU is addressing the problem for customers of Microsoft and other IAM platforms.
A massive software outage impacting Microsoft customers underscores the need for IT resiliency, resources that can respond quickly when systems go down.
Microsoft, IBM Consulting extend partnership with cybersecurity services that provide threat monitoring and identity management in hybrid clouds.
This guidebook offers insights from CISO Chris Hughes and CIO Kenny Mullican on maximizing multicloud benefits while mitigating its downsides.
This report analyzes Microsoft’s security culture and promises of reform from CEO Satya Nadella following a widely reported breach, while highlighting the dual-edged quality of AI in cybersecurity.
Executives from Lookout and Pax8 discuss their new partnership to enhance mobile security for small and medium-sized businesses through a cloud marketplace.
Partner integrates Data Security Posture Management (DSPM) with ServiceNow’s Security Posture Control tool for a 360-degree view of a customer’s attack surface.
IBM research gives CEOs advice on how to ensure people and skills adapt to GenAI, top use cases to consider, and where they can get the most bang for the buck.
This guidebook offers insights on making zero trust a reality in our businesses, minimizing vulnerabilities that come with SaaS applications, mobile devices, and hybrid work environments.
In this report, Chris Hughes identifies five products — from CloudStrike, NetRise, Palo Alto Networks, Wiz, and Zscaler — that equip CISOs to combat the latest threats.
AnalystGPT taps into over 10,000 reports, articles, and videos by Acceleration Economy practitioner analysts to answer questions about AI, cloud, cybersecurity, and data.
Bob Evans and Chris Hughes discuss the evolving role of the CIO, and explore the relationship between a CIO and a CISO in this Digital CIO Summit moment.
The World Economic Forum (WEF) is anticipating a cyberstorm, which calls for a global, unified response across geopolitical borders.
In this CloudWorld News Desk interview, Oracle Senior VP of Cloud Infrastructure Mahesh Thiagarajan explains why some users are still reluctant to engage with multi-cloud platforms.
As a mode of communication for security teams, vulnerability reports require effective management but often involve a problematic process.
When faced with vulnerabilities, businesses often have to focus on the most severe cases. But, vulnerability management needs to go beyond these scoring frameworks.
















