Tag artificial intelligence

Pentera Acquires DevOcean to Enhance Vulnerability Remediation

Governance & Risk Management, Security Operations, Vulnerability Assessment & Penetration Testing (VA/PT) Pentera Acquires DevOcean to Enhance Attack Simulation and Remediation Michael Novinson (MichaelNovinson) • October 9, 2025 Amitai Ratzon, co-founder and CEO, Pentera (Image: Pentera) Pentera has announced the acquisition of DevOcean, an Israeli startup founded by a former…

Read MorePentera Acquires DevOcean to Enhance Vulnerability Remediation

GitHub Copilot Chat Vulnerability Exposes Private Code Through Images

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Research Uncovers Vulnerability Allowing Data Exfiltration via Hidden Images Rashmi Ramesh (rashmiramesh_) • October 9, 2025 Image: PJ McDonnell/Shutterstock A recently resolved vulnerability within GitHub Copilot Chat has been identified, which could have permitted threat actors to extract source code…

Read MoreGitHub Copilot Chat Vulnerability Exposes Private Code Through Images

EU Reveals Plans for AI Technology Sovereignty

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development AI Strategies Aim to Strengthen Global AI Position Akshaya Asokan (asokan_akshaya) • October 8, 2025 Henna Virkkunen, European Commissioner for Technological Sovereignty, Security, and Democracy, during an Aug. 10, 2025 European Parliament session. (Image: Philippe Stirnweiss/European Union) The European Union…

Read MoreEU Reveals Plans for AI Technology Sovereignty

AI: The Simplified Way to Assume Your Identity – Webinar

Thank you for registering with ISMG Complete your profile to stay informed. Select Title LevelAnalytics/Architecture/EngineeringAttorney / General Counsel / CounselAssistant Vice President (AVP)Board MemberC-Level ExecutiveC-Level – OtherChief Commercial Officer (CCO)Chief Executive Officer (CEO) / PresidentChief Financial Officer (CFO)ChairpersonChief Information Officer (CIO)Chief Information Security Officer (CISO) / Chief Security Officer (CSO)CISO/CSO/CIOChief…

Read MoreAI: The Simplified Way to Assume Your Identity – Webinar

ICE Plans to Establish a Round-the-Clock Social Media Surveillance Team

ICE’s Intelligence Operations: Gathering Data on Individuals through Surveillance Recent advancements in ICE’s Enforcement and Removal Operations indicate a strategic shift towards enhanced data collection and analysis capabilities. ICE plans to establish specialized teams that will act as intelligence units, handling incoming tips and cases. These teams will conduct online…

Read MoreICE Plans to Establish a Round-the-Clock Social Media Surveillance Team

Former Google Engineer Arrested for Allegedly Stealing AI Technology Trade Secrets for China

The U.S. Department of Justice (DoJ) has indicted a 38-year-old Chinese national and a California resident for allegedly stealing proprietary information from Google while covertly working for two tech firms based in China. The indictment highlights a significant cybersecurity breach involving sensitive data theft pertinent to artificial intelligence. Linwei Ding,…

Read MoreFormer Google Engineer Arrested for Allegedly Stealing AI Technology Trade Secrets for China

The Impact of CISA 2015 on Cyber Threat Sharing Practices

Government, Industry Specific, Information Sharing Experts Warn of Risks to Public-Private Cyberthreat Sharing Amid Legislative Uncertainty Chris Riotta (@chrisriotta) • September 30, 2025 Image: Bryan Brazil/Shutterstock As the expiration of a pivotal statute that shields companies from liability for sharing cyberthreat indicators approaches, experts are raising concerns about the implications…

Read MoreThe Impact of CISA 2015 on Cyber Threat Sharing Practices