Latest from todayNewsCrowdstrike cybersecurity report highlights a spike in physical attacks on privileged usersWill CISOs now have to plan defenses for attackers with guns and knives? Said one consultant: “It is giving new meaning to 'brute force' attacks.”By Evan SchumanNov 4, 20255 minsCybercrimePhysical SecuritySecurity Opinion Foreign aircraft, domestic risksBy Daniel HoffmanJun 19, 20259 minsCyberattacksGovernmentManufacturing IndustryNews Meta wins $168M judgment against spyware seller NSO GroupBy Gyana SwainMay 7, 20251 minMalwareNetwork SecuritySurveillance FeatureJohnson Controls rethinks IT for the cloud-native and AI eraBy Paula Rooney May 5, 20251 minIT LeadershipPhysical Security FeatureHow CISOs can protect their personal liabilityBy Ericka Chickowski Jul 3, 202413 minsCSO and CISOEmployee Protection FeatureWhat is digital executive protection and how does it work?By Deb Radcliff Jun 26, 20248 minsCSO and CISOCyberattacksEmployee Protection NewsNorth Korea hacked into Russian missile company: Report By Shweta Sharma Aug 8, 20234 minsData BreachSurveillance NewsApple patches exploits used in spy campaign ‘Operation Triangulation’By Shweta Sharma Jun 22, 20233 minsMalwareSurveillance News AnalysisRussia points finger at US for iPhone exploit campaign that also hit Kaspersky LabBy Lucian Constantin Jun 2, 20235 minsAdvanced Persistent ThreatsMalwareSurveillance ArticlesopinionThe classified document leak: let’s talk about Jack Teixeira’s need-to-knowThe release of classified documents by a US Air National Guardsman highlights how important it is for CISOs to consider who should have access to sensitive data and why.By Christopher Burgess Apr 18, 2023 6 minsData and Information SecurityGovernmentMilitarynews analysisSpyware vendors use exploit chains to take advantage of patch delays in mobile ecosystemSpyware vendors use a combination of zero-day exploits and known vulnerabilities. Google TAG researchers urge faster patching of mobile devices By Lucian Constantin Mar 31, 2023 6 minsMobile SecuritySurveillanceZero-Day Vulnerabilitiesnews analysisBiden administration seeks to tamp down the spyware market with a new banThe Biden administration issued an executive order to outlaw the federal government's use of commercial foreign spyware–with some caveats.By Cynthia Brumfield Mar 27, 2023 6 minsLaws and RegulationsSurveillancenewsFrance bans TikTok, all social media apps from government devicesFrench government says TikTok and all other “recreational apps” pose data security risks if installed on government and senior official devices. By Michael Hill Mar 27, 2023 3 minsData and Information SecurityGovernmentSurveillancenews analysisSurge of swatting attacks targets corporate executives and board membersSwatters use data brokers and stolen information on the dark web to target C-suite and board members. Removing personal information from the web is the best way to minimize this risk.By Cynthia Brumfield Feb 8, 2023 6 minsData and Information SecurityPhysical SecurityopinionWhat CISOs need to know about the renewal of FISA Section 702Section 702 of the Foreign Intelligence Surveillance Act sets out the rules for the US intelligence community around gathering information abroad—but is it inadvertently being used at home too?By Christopher Burgess Feb 7, 2023 6 minsGovernmentLaws and RegulationsSurveillancenews analysisUS Maritime Administrator to study port crane cybersecurity concernsRecently passed legislation might have been spurred by supply chain disruption and surveillance concerns enabled by Chinese-made cranes.By Cynthia Brumfield Jan 17, 2023 6 minsAdvanced Persistent ThreatsSupply ChainSurveillanceopinionIf governments are banning TikTok, why is it still on your corporate devices?When lawmakers and higher education take steps to prevent official users from accessing the popular video-sharing app on their devices, corporations should sit up and take notice. By Christopher Burgess Jan 9, 2023 5 minsApplication SecurityBusiness IT AlignmentEmployee ProtectionfeatureWhen blaming the user for a security breach is unfair – or just wrongTraining non-tech savvy users to recognize phishing and other credential-based attacks is essential but expecting employees to man the front lines against intrusions is a mistake, experts say. Harmony between staff psychology and frictionless security technology is the ideal to shoot for. By Deb Radcliff Dec 5, 2022 8 minsBusiness IT AlignmentEmployee ExperienceEmployee ProtectionanalysisStuxnet explained: The first known cyberweaponThanks to Stuxnet, we now live in a world where code can destroy machinery and stop (or start) a war. By Josh Fruhlinger Aug 31, 2022 11 minsCybercrimeMalwarePhysical SecuritynewsChinese cyber espionage campaign targeted Australia, South China Sea energy sector, says studyThe campaign was aimed at Australian governmental agencies and media companies, and at maintainers of wind turbines in the South China Sea.By Apurva Venkat Aug 30, 2022 5 minsCyberattacksSurveillancenews analysisSpyware infections continue as the U.S. federal government takes noticeAs more high-profile instances of spyware misuse come to light, the U.S. government begins to take action to address the threat.By Cynthia Brumfield Jul 27, 2022 6 minsMalwareSurveillance Show more Show less View all Resources whitepaper Modernizing Core Infrastructure for AI-Ready SaaS Apps: Unlocking XOps Agility Are your SaaS systems ready for AI-driven innovation? The post Modernizing Core Infrastructure for AI-Ready SaaS Apps: Unlocking XOps Agility appeared first on Whitepaper Repository –. By F5 10 Dec 2025Application ManagementCloudSecurity whitepaper F5 Webinar Featuring Forrester: Navigating the New Era of App Delivery and Security By F5 10 Dec 2025Application ManagementApplication SecurityCloud whitepaper The State of Application Strategy in 2025 By F5 10 Dec 2025Application ManagementArtificial IntelligenceDigital Transformation View all Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPrivacyRisk ManagementView all topics Show me morePopularArticlesPodcastsVideos how-to How to justify your security investments By Chritstoph SchuhwerkDec 11, 20256 mins C-SuiteCSO and CISOIT Leadership news Fortinet admins urged to update software to close FortiCloud SSO holes By Howard SolomonDec 10, 20254 mins Access ControlIdentity and Access ManagementSingle Sign-on news Making cybercrime illegal won't stop it; making cybersec research legal may By Maxwell CooterDec 10, 20255 mins CybercrimeGovernmentIndustry podcast CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure podcast Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing podcast The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management video CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure video Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing video The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management