Splunk and cisco unveil a suite of innovations
Friday, February 13, 2026 by Richard Harris
What if you could see every corner of your AI powered systems, predict issues before they arise, and deliver seamless digital experiences, all while fortifying your cybersecurity defenses? Splunk and Cisco are bringing that outcome within reach through a suite of platform, observability, and security advancements that help teams move faster with confidence in an agentic...
Russian airport hacked as St. Petersburg website reports cyberattack
Monday, October 6, 2025 by Trey Abbe
Pulkovo airport, the primary international gateway for St. Petersburg, reported that its official website had been compromised in a cyberattack. The airport serves millions of passengers annually, making secure digital operations essential for timely flight information and passenger services. Officials confirmed that the attack temporarily disrupted access to the websit...
Hackers steal cryptocurrency using fake job offers report reveals
Tuesday, September 9, 2025 by Trey Abbe
A recent investigation reveals that North Korean hacking groups are using elaborate fake job offers to steal cryptocurrency from blockchain professionals and investors. The scams, identified in a joint report by cybersecurity firms SentinelOne and Validin, include posing as recruiters for major crypto companies and directing applicants to download malicious software or ...
Universities fighting cybercrime with students
Thursday, April 24, 2025 by Richard Harris
Universities, one of the most popular targets for cybercriminals, are employing a new tool in the fight against cybercrime, their own students.
Over the past few years, universities and colleges around the U.S. have been increasingly hiring students and training them to become analysts in their security operations centers, known as SOCs. Students work alongside...
Crowdsourced security and bug bounty adoption is spreading
Monday, May 20, 2019 by Richard Harris
There continues to be a fundamental imbalance in cybersecurity. Attackers are finding new ways to penetrate cyber defenses as targets proliferate to the cloud, mobile, and connected devices. Defenders need to take a proactive security approach.
The evolving threat landscape and the ever-widening security skills gap are giving rise to new approaches such as crowdsourc...
NVIDIA urges congressional committee to embrace AI
Thursday, February 22, 2018 by Richard Harris
Artificial intelligence represents the biggest technological and economic shift in our lifetime, NVIDIA’s Ian Buck told a U.S. Congressional committee recently. In testimony before a hearing of the House of Representatives Subcommittee on Information Technology, Buck, vice president and general manager of our Tesla business, said the federal government should increase r...
8 cyber security predictions for what's to come in AsiaPacific
Thursday, December 29, 2016 by Austin Harris
Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...
New SAP Cybersecurity Report
Wednesday, June 1, 2016 by Stuart Parkerson
Onapsis has released a new SANS report, “Blueprint for CIS Control Application: Securing the SAP Landscape”, that maps SAP cybersecurity to the CIS Critical Security Controls for Effective Cyber Defense. The SANS Institute was established in 1989 as a cooperative research and education organization. The CIS Critical Security Controls are a set of internationally re...