How Should Effective AI Red Teams Operate?
Dr. Peter Garraghan speaks with Security magazine about AI-specific red teaming.
Unauthorized Users Accessed Claude Mythos, New Reports Suggest
Anthropic’s new AI model may have been accessed by unauthorized users.
Why Bridging Siloes Doesn’t Need to Be Complicated
Bruce McIndoe discusses provides actionable steps for bridging siloes.
Hackers Claim 19M Records Stolen From French Government Agency
The France Titres discovered a security incident.
The Security Metric That’s Failing You
Security teams have measured patch rates for so long that somewhere along the way, the metric became the strategy.
The Privacy–Security Partnership: How We Bend Risk in a Resource Crunch
The partnership between cybersecurity and privacy matters now more than ever.
Safe Learning 101 Program Supports Schools in Strengthening Campus Security
Security magazine speaks with the expert partner behind this program.
Security Leaders Discuss the Vercel Breach
Security leaders are discussing the Vercel breach.
When Metal Theft Becomes a Life Safety Crisis
Lessons from telecommunications infrastructure attacks.
US Security Agency Leverages Claude Mythos Despite Pentagon Blacklist
Reports suggest that the NSA is using Claude Mythos.











