❌

Reading view

There are new articles available, click to refresh the page.

How Thales Protects Online Retail Sites from AI-Driven Bots during Holiday Shopping Season

Every November and December, online retailers gear up for their biggest revenue surge of the year. But while the traffic and transactions climb, so does the threat level. Cybercriminals know exactly when customer activity (and the pressure on retail systems) is at its highest and they’re automating their attacks to exploit it. Why retailers are […]

The post How Thales Protects Online Retail Sites from AI-Driven Bots during Holiday Shopping Season appeared first on Blog.

The post How Thales Protects Online Retail Sites from AI-Driven Bots during Holiday Shopping Season appeared first on Security Boulevard.

Paris, The Thinker, and why your WAF should block XSS by default

With Thales HQ in Paris, it felt right to detour to the MusΓ©e Rodin and stand before The Thinker, the bronze giant by Auguste Rodin whose clenched posture and chin-in-hand stance have become a universal symbol of deep judgment. Conceived for The Gates of Hell in 1880 and first cast monumentally in 1904, The Thinker […]

The post Paris, The Thinker, and why your WAF should block XSS by default appeared first on Blog.

The post Paris, The Thinker, and why your WAF should block XSS by default appeared first on Security Boulevard.

Securing AI-Generated Code in Enterprise Applications: The New Frontier for AppSec TeamsΒ 

GenAI, multimodal ai, AI agents, CISO, AI, Malware, DataKrypto, Tumeryk,

AI-generated code is reshaping software development and introducing new security risks. Organizations must strengthen governance, expand testing and train developers to ensure AI-assisted coding remains secure and compliant.

The post Securing AI-Generated Code in Enterprise Applications: The New Frontier for AppSec TeamsΒ  appeared first on Security Boulevard.

Root Detection in Android Apps – Security Benefits, Challenges, and Implementation Strategies

Among the most debated questions in the constantly changing mobile application development, whether to include root detection in the application is a seemingly important choice to both developers and security...

The post Root Detection in Android Apps – Security Benefits, Challenges, and Implementation Strategies appeared first on Strobes Security.

The post Root Detection in Android Apps – Security Benefits, Challenges, and Implementation Strategies appeared first on Security Boulevard.

AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage

By: Tom Eston

In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as we examine the […]

The post AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage appeared first on Shared Security Podcast.

The post AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage appeared first on Security Boulevard.

πŸ’Ύ

CIO Essential Insights: The New Security Priorities

Join host John Gallant for a deep dive into key threats and operational priorities that security pros are focusing on for the coming year. This conversation with Patty Patria, CIO at Babson College, and Gary Jeter, EVP/Chief Technology Officer at TruStone Financial, centers on the results of Foundry’s annual Security Priorities research. We explore how AI is reshaping the risk landscape while also providing new tools for stretched security teams. Budgets, reporting structures, security technology adoption plans and more are on the table in this in-depth discussion on today’s security landscape.

Register to watch the episode here:

CIO Essential Insights: The New Security Priorities

Our expert panelΒ 

Hear from the following panel of CIO experts:Β 
Patty Patria, CIO, Babson College
Gary Jeter, EVP/Chief Technology Officer, TruStone Financial

Take part in CIO Essential InsightsΒ 

If you would like to be part of a future episode of CIO Essential Insights, please sign up for the Foundry Contributor Network, or contact ellen_fanning@foundryco.com.Β 

Future episodes will feature:Β 

Cloud Computing (December 2025)
IT operations (January 2026)
Emerging tech (February 2026)
Data Center (March 2026)
IT Leadership (April 2026)
Software Development (May 2026)
Cloud computing (June 2026)
Artificial Intelligence (July 2026)
IT Leadership (August 2026)
Business Applications (September 2026)
Security (October 2026)
Data management (November 2026)
Careers (December 2026)

❌