Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

While vulnerability management and patching remain necessary, they are not sufficient to address the new reality that Mythos represents.

NIST’s New Prioritization Criteria for CVEs, Examined by Experts

NIST recently changed how it handles CVEs. 

How Should Effective AI Red Teams Operate?

Dr. Peter Garraghan speaks with Security magazine about AI-specific red teaming. 

Kwara Governor Receives New NSCDC Commandant, Pledges Sustained Support for Security

The Executive Governor of Kwara State, AbdulRahman AbdulRazaq, on Tuesday, 21 April 2026, received the newly deployed State Commandant of the Nigeria Security and Civil Defence Corps, Kwara State Command,…

Unauthorized Users Accessed Claude Mythos, New Reports Suggest

Anthropic’s new AI model may have been accessed by unauthorized users. 

Why Bridging Siloes Doesn’t Need to Be Complicated

Bruce McIndoe discusses provides actionable steps for bridging siloes.

Hackers Claim 19M Records Stolen From French Government Agency

The France Titres discovered a security incident. 

The Security Metric That’s Failing You

Security teams have measured patch rates for so long that somewhere along the way, the metric became the strategy.

The Privacy–Security Partnership: How We Bend Risk in a Resource Crunch

The partnership between cybersecurity and privacy matters now more than ever.

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Security magazine speaks with the expert partner behind this program.