Topic: vendor collaboration
-
Securing Legacy Medical Devices Beyond Patching
Legacy medical devices without security patches require protective barriers and close collaboration with vendors to manage risks and plan phased replacements. A risk-based security approach supports compliance by focusing on proactive measures, staff education, and strategic risk mitigation rathe...
Read More » -
Gartner: 50% of Security Spend to Go Proactive by 2030
By 2030, proactive security solutions are projected to account for half of all IT security spending, shifting focus from reactive tools to technologies that prevent threats before they cause damage. This preemptive approach leverages AI and machine learning to predict and neutralize attacks, usin...
Read More » -
Intel Unveils 160GB Energy-Efficient Inference GPU in New Annual Release
Intel has launched the Crescent Island data center GPU, a 160GB model optimized for energy-efficient AI inference, marking the start of an annual GPU release schedule to compete in the AI infrastructure market. The GPU, built with Xe3P microarchitecture, is designed for high performance-per-watt ...
Read More » -
Radware Exposes Critical ChatGPT Zero-Click Vulnerability
Radware discovered "ShadowLeak," a zero-click vulnerability in ChatGPT's Deep Research agent that autonomously extracts sensitive data from OpenAI's cloud servers without user interaction. The exploit allows attackers to trigger a data breach simply by sending an email, as the AI agent processes ...
Read More » -
SpyCloud Exposes Vendor Identity Risk with New Supply Chain Protection
SpyCloud's new platform addresses supply chain attacks by extending identity threat defense to third-party vendors, using actionable intelligence from the criminal underground to move beyond passive risk observation. The solution is critical as third-party involvement in data breaches has doubled...
Read More » -
Global Software Supply Chains Lack Critical Visibility
Only 23% of organizations have strong software supply chain visibility, leaving most vulnerable to cybersecurity risks and disruptions. 80% of businesses with poor visibility suffered breaches, with AI adoption and third-party integrations amplifying vulnerabilities. Regional gaps exist in prepar...
Read More »