Please turn JavaScript on
Researchcenter icon

Researchcenter

Subscribe to Researchcenter’s news feed.

Click on “Follow” and decide if you want to get news from Researchcenter via RSS, as email newsletter, via mobile or on your personal news page.

Subscription to Researchcenter comes without risk as you can unsubscribe instantly at any time.

You can also filter the feed to your needs via topics and keywords so that you only receive the news from Researchcenter which you are really interested in. Click on the blue “Filter” button below to get started.

Title: Researchcenter

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.41 / day

Message History

How Nations Hack, Why Attribution Fails, and What AI Changes Executive Summary:
Code War author Allie Mellen, argues that cyberwarfare must be understood through a human and geopolitical lens to ...

Read full story
Key Takeaways Built on the Pioneers of PAM (privileged access management): Idira™ is Palo Alto Networks next-generation identity security platform, extending privileged access controls to every human, machine and AI agent identity in the AI enterprise. Zero Standing Privilege by Default: Idira replaces static, always-on access with dynamic privilege, granted just-in-time on a s...

Read full story

For the last several months, we have had early, unbounded access to the latest frontier AI models. What we’ve seen from that vantage point has made it clear that the window for organizations to get ahead of what’s coming is shorter than most leaders realize.

We have moved past the era of incremental AI improvements into a threat landscape shift. Our testing has reveale...


Read full story
Elevating AI Security

Every AI system you deploy is a potential attack surface. Models and agents can carry embedded backdoors, malicious operators or compromised dependencies. Once running, these artifacts can exfiltrate sensitive data or execute unauthorized code, creating persistent vulnerabi...


Read full story

Not hours. Not days. It takes thirty-nine seconds from initial access to data exfiltration.

That stat, pulled from Unit 42® research, isn't hypothetical. It's what defenders are up against right now, while most organizations are still building security teams around manual detection and response workflows that were never designed to operate at machine speed.

Wend...


Read full story