top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Amol Dalvi: Endpoint Security Is Getting More Complex in the Age of Cloud Desktops and AI Agents
As enterprise environments rapidly evolve beyond traditional devices, the definition of an endpoint is being fundamentally redefined. In this interview, Amol Dalvi, VP of Product, Nerdio explores how hybrid work, cloud desktops, and AI agents are expanding the attack surface in unexpected ways. He breaks down why identity, visibility, and governance are now at the core of modern endpoint security strategies. Why has endpoint security become so much more complex for enterpris
9 minutes ago


Ransomware at Machine Speed: Why Financial Institutions Are Facing an AI-Driven Inflection Point
This guest article was contributed by Aviral Verma, Head of Research, Securin Ransomware remains one of the most dangerous cyber threats in 2026. Not because it’s new, but because it’s faster, more scalable and increasingly powered by AI. Attackers are using AI to automate malware, refine phishing and chain exploits with unprecedented efficiency, while defenders rely on it to improve detection and response. Securin’s latest Ransomware Index Report shows that in 2025, ransom
22 minutes ago


Jerry Raphael, Hypori: In Wake of Stryker Attack, Mobile Device Security Needs a Major Rethink
The recent incident involving Stryker highlights a critical shift in mobile security risk, where legitimate tools like remote wipe can be turned against organizations. We sat down with Hypori CFO Jerry Raphael to learn why the breach exposes deeper architectural flaws rather than just gaps in controls. The recent Stryker attack demonstrates the continuing challenges with mobile device security and remote wipe risk. Can you put those risk into greater context? Sure. I fly int
34 minutes ago


Canvas LMS Breach: ShinyHunters Claims Second Attack as Schools Face Finals Week Disruptions
A high-profile cyberattack targeting one of the world’s most widely used education platforms has escalated into a multi-stage extortion campaign, raising fresh concerns about SaaS security, identity risk, and third-party dependencies across higher education. The hacking collective ShinyHunters claims it breached systems tied to Instructure, the company behind Canvas LMS, not once but twice in recent weeks. The timing has amplified the impact. Both incidents coincided with fin
57 minutes ago


Casepoint and Proofpoint Link Platforms to Streamline eDiscovery and Communications Governance
A new partnership between Casepoint and Proofpoint is targeting one of the most persistent friction points in modern legal and compliance operations: the disconnect between communications archiving and downstream legal response. The integration connects the Casepoint platform with Proofpoint’s Archive solution, part of its Digital Communications Governance portfolio. The goal is straightforward but significant. Eliminate the manual handoffs that slow investigations, increase
1 hour ago
bottom of page