Filling the Most Common Gaps in Google Workspace Security

The Hacker NewsJan 22, 2026Email Security / SaaS Security Security teams at agile, fast-growing companies often have the same mandate: secure the business without slowing it down. Most teams inherit a tech stack optimized for breakneck growth, not resilience. In these environments, the security team is the helpdesk, the compliance expert, and the incident response…

Read More

Top 10 AI security tools for enterprises in 2026

Enterprise AI has moved from isolated prototypes to systems that shape real decisions: drafting customer responses, summarising internal knowledge, generating code, accelerating research, and powering agent workflows that can trigger actions in business systems. That creates a new security surface, one that sits between people, proprietary data, and automated execution. AI security tools exist to…

Read More

Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

Ravie LakshmananJan 08, 2026Network Security / Vulnerability Cisco has released updates to address a medium-severity security flaw in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) with a public proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with…

Read More

Why Data Security and Privacy Need to Start in Code

AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing rapid growth in both the number of applications and the pace of change within those applications. Security and privacy teams are under significant pressure as the surface area they must cover is expanding quickly while their…

Read More

Adversarial learning breakthrough enables real-time AI security

The ability to execute adversarial learning for real-time AI security offers a decisive advantage over static defence mechanisms. The emergence of AI-driven attacks – utilising reinforcement learning (RL) and Large Language Model (LLM) capabilities – has created a class of “vibe hacking” and adaptive threats that mutate faster than human teams can respond. This represents…

Read More

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and administration (IGA), access management (AM), privileged access management (PAM), and identity threat detection and response (ITDR) are all integrated into a single, cohesive control plane. Building on Gartner’s definition of “identity fabric,” identity security fabric…

Read More

    Homeland Security reassigns ‘hundreds’ of CISA cyber staffers to support Trump’s deportation crackdown

    The U.S. Department of Homeland Security is reassigning hundreds of employees across several of its agencies to assist in the Trump administration’s broad immigration crackdown and will dismiss staffers who refuse to comply, according to news reports. Bloomberg reported Wednesday that the department moved staffers from the U.S. cybersecurity agency CISA, many of whom focus…

    Read More

    LLM-Crafted SVG Files Outsmart Email Security

    Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade security defenses. “Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging business terminology and…

    Read More