Topic: vendor collaboration

  • Securing Legacy Medical Devices Beyond Patching

    Securing Legacy Medical Devices Beyond Patching

    Legacy medical devices without security patches require protective barriers and close collaboration with vendors to manage risks and plan phased replacements. A risk-based security approach supports compliance by focusing on proactive measures, staff education, and strategic risk mitigation rathe...

    Read More »
  • Gartner: 50% of Security Spend to Go Proactive by 2030

    Gartner: 50% of Security Spend to Go Proactive by 2030

    By 2030, proactive security solutions are projected to account for half of all IT security spending, shifting focus from reactive tools to technologies that prevent threats before they cause damage. This preemptive approach leverages AI and machine learning to predict and neutralize attacks, usin...

    Read More »
  • Intel Unveils 160GB Energy-Efficient Inference GPU in New Annual Release

    Intel Unveils 160GB Energy-Efficient Inference GPU in New Annual Release

    Intel has launched the Crescent Island data center GPU, a 160GB model optimized for energy-efficient AI inference, marking the start of an annual GPU release schedule to compete in the AI infrastructure market. The GPU, built with Xe3P microarchitecture, is designed for high performance-per-watt ...

    Read More »
  • Radware Exposes Critical ChatGPT Zero-Click Vulnerability

    Radware Exposes Critical ChatGPT Zero-Click Vulnerability

    Radware discovered "ShadowLeak," a zero-click vulnerability in ChatGPT's Deep Research agent that autonomously extracts sensitive data from OpenAI's cloud servers without user interaction. The exploit allows attackers to trigger a data breach simply by sending an email, as the AI agent processes ...

    Read More »
  • SpyCloud Exposes Vendor Identity Risk with New Supply Chain Protection

    SpyCloud Exposes Vendor Identity Risk with New Supply Chain Protection

    SpyCloud's new platform addresses supply chain attacks by extending identity threat defense to third-party vendors, using actionable intelligence from the criminal underground to move beyond passive risk observation. The solution is critical as third-party involvement in data breaches has doubled...

    Read More »
  • Global Software Supply Chains Lack Critical Visibility

    Global Software Supply Chains Lack Critical Visibility

    Only 23% of organizations have strong software supply chain visibility, leaving most vulnerable to cybersecurity risks and disruptions. 80% of businesses with poor visibility suffered breaches, with AI adoption and third-party integrations amplifying vulnerabilities. Regional gaps exist in prepar...

    Read More »