Cyber Risk Management

Was Fast16 the Pre-Stuxnet Blueprint for Silent Sabotage?

Security

Was Fast16 the Pre-Stuxnet Blueprint for Silent Sabotage?

Malik Haidar has spent years inside multinationals translating threat intelligence into boardroom-ready decisions, bridging analytics with business impact. In this conversation with Jason Costain, he unpacks what an early, Lua‑powered sabotage plat

Security CrowdStrike, Tenable Fix Severe Bugs in Enterprise Tools

Why Fixes to Security Tools Matter Now: Context, Stakes, and What This Story Covers Breaches often begin where trust is highest, and security platforms sit closest to the crown jewels, so a single unpatched flaw can flip defenses into conduits for stealthy data access, lateral movement, and

CrowdStrike, Tenable Fix Severe Bugs in Enterprise Tools
Analytics Intelligence Did Insider Misuse Put UK Biobank’s Data Up for Sale?

Janine Saintos sits down with Malik Haidar, a cybersecurity expert known for bridging business priorities with rigorous threat intelligence. He unpacks how a dataset connected to roughly 500,000 research volunteers surfaced abroad, what moved the needle in the first 24 hours, and how a UK-hosted,

Did Insider Misuse Put UK Biobank’s Data Up for Sale?
Business Perspectives Can Agentic Defense Help Defenders Outpace AI Adversaries?

Seconds now decide outcomes as AI-enabled intrusions fan out across cloud, SaaS, and edge while defenders juggle exploding non-human identities, compressed detection windows, and demands for provable governance that still lets the business move fast. The Rise of AI-Native Security: Scope,

Can Agentic Defense Help Defenders Outpace AI Adversaries?
Business Perspectives Cyber Tops CRO Priorities as Insurers Embrace AI and Data

A drumbeat of faster, intertwined risks has pushed cybersecurity to the top of insurance risk agendas, and the shift is reshaping how risk is governed, staffed, and tooled across carriers, reinsurers, brokers, and insurtech partners as technology, geopolitics, climate, and conduct fuse into a

Cyber Tops CRO Priorities as Insurers Embrace AI and Data
Analytics Intelligence Can Cyber Intelligence Outpace AI-Powered Threats?

Malik Haidar has spent years inside multinational firms chasing down intrusions, deconstructing adversary tradecraft, and turning raw telemetry into board-ready decisions. He blends analytics, intelligence, and security with a sharp business lens, the kind you need when thousands of devices can go

Can Cyber Intelligence Outpace AI-Powered Threats?
Security Can PhantomRPC Turn Missing RPC Servers Into SYSTEM Access?

Windows RPC Trust Boundaries, Market Actors, and Why PhantomRPC Resonates Now When privileged Windows clients reach for familiar RPC servers that happen to be missing, the runtime’s willingness to accept a substitute responder can turn a routine call into an identity handoff that elevates l

Can PhantomRPC Turn Missing RPC Servers Into SYSTEM Access?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address