Content Paint

The Snack

Interviews, Insight, Intelligence for Hungry Folks

LLMs  | Jul 26, 2024
/
(Image: Issy Bailey, Unsplash)
CISO  | Jul 26, 2024
/
"We're becoming scapegoats":  How have CISOs responded to SEC cyber risk disclosure rules?
ServiceNow  | Jul 26, 2024
/
“Our company policy was violated” – former US Army CIO, President resign at ServiceNow after federal procurement investigation
Ford  | Jul 25, 2024
/
ford software sales
Microsoft  | Apr 05, 2024
/
Microsoft gets das boot in Germany as local gov opts for Libre Office.
Microsoft  | Mar 08, 2024
/
Microsoft customers are being targeted after Redmond's source code, secrets were stolen

All the latest

All the latest

2438 Posts
Hugging Face left with split lip after someone punches way into Spaces secrets

"We pledge to use this as an opportunity to strengthen the security of our entire infrastructure"

snowflake breach update

"The user must be left in the disabled state for 6 hours to fully invalidate any possible unauthorized access via this ID token feature."

Check Point vulnerability CVE-2024-24919

106,000 customers publicly exposed, initial searches suggest.

Deepfake CEO scams overblown - for now at least

WithSecure CRO warns on post quantum cryptography, as mid-sized firms struggle with attacks on the edge

The Big Interview - Pure Storage Founder and CTO John “Coz” Colgrove

“I've talked to some of the largest companies in the world who say they budget their data centres in watts not dollars. They’ve got money flowing out of their ears, but they cannot get the power.”

An attacker shift toward black box appliances and lower layers of IT infrastructure has left organisations with a huge security gap

Turf wars? NIST to fix NVD backlog by September – insists it’s right agency to run vulnerability database

Update comes after CISA started enriching CVEs itself…

EU shows "a complete lack of security thinking" says former Estonian president

Estonian ex-prez Ilves and Columbia Law prof deliver stark warning to cyberpros

New North Korean threat group seen deploying custom ransomware

Multiple Fortune 500 firms breached. Threat group uses remote IT staff, social engineering, trojanised npm packages, even a poisoned "tank game"

Browse by Tags

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.