How Should Effective AI Red Teams Operate?

Dr. Peter Garraghan speaks with Security magazine about AI-specific red teaming. 

Unauthorized Users Accessed Claude Mythos, New Reports Suggest

Anthropic’s new AI model may have been accessed by unauthorized users. 

Why Bridging Siloes Doesn’t Need to Be Complicated

Bruce McIndoe discusses provides actionable steps for bridging siloes.

Hackers Claim 19M Records Stolen From French Government Agency

The France Titres discovered a security incident. 

The Security Metric That’s Failing You

Security teams have measured patch rates for so long that somewhere along the way, the metric became the strategy.

The Privacy–Security Partnership: How We Bend Risk in a Resource Crunch

The partnership between cybersecurity and privacy matters now more than ever.

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Security magazine speaks with the expert partner behind this program. 

Security Leaders Discuss the Vercel Breach

Security leaders are discussing the Vercel breach. 

When Metal Theft Becomes a Life Safety Crisis

Lessons from telecommunications infrastructure attacks. 

US Security Agency Leverages Claude Mythos Despite Pentagon Blacklist

Reports suggest that the NSA is using Claude Mythos.