In this week's panel, four editors explored how old threats like digital skimming are evolving, why AI tech's push into personal health data is raising new questions and what CrowdStrike's back-to-back acquisitions say about where cybersecurity competition is heading.
The shift from brute-force attacks to AI-powered phishing is creating tougher challenges for defenders. Thales CISO, Americas, Eric Liebowitz says combining employee training with behavioral monitoring and AI guardrails is essential to mitigate identity risk.
In this week's panel, ISMG editors discussed how basic security failures are still opening the door to major breaches, how researchers are rethinking data protection in the age of artificial intelligence and the implications of robots with AI patrolling national borders.
In the latest "Proof of Concept," Chase Cunningham, CSO, Demo-Force.com, and Brandy Harris, director, CyberEd.io, joined ISMG editors to examine why cybersecurity hiring continues to fail. Despite a growing talent pipeline, outdated frameworks and unrealistic expectations block progress.
Anshita Mittal, vice president of delivery and senior technical architect with IDMExpress, explains why evolving identity systems incrementally delivers faster results and lower risks than big bang migrations, even when AI implementation isn't feasible.
Eoghan Mulligan of Daon details how enterprises can counter industrialized fraud with orchestration, richer risk signals and unified identity platforms that verify digital and physical credentials across the customer journey.
AI-driven attacks move faster and hit harder. Legacy cybersecurity stacks leave gaps. Platform-based privileged access management helps organizations secure every user, device and environment, according to Darren Guccione, co-founder and CEO of Keeper Security.
Identity management is growing more complex as AI and non-human agents surge. Gianni Aiello, head of product at Lumos, says security teams must stop chasing broad automation and instead use data and AI to pinpoint risks and drive targeted, measurable identity improvements.
Identity moved from a background control to the primary security layer as enterprises face massive growth in human and machine identities, faster access cycles, and higher expectations for digital trust, said Haider Iqbal, director of product marketing for identity and access management at Thales.
CEO Danny Jenkins explains how ThreatLocker evolved into a systemwide checker for third-party configurations, including Windows and Office 365. He says the company uncovers dangerous oversights that traditional audits miss and pushes users to adopt real-world zero trust by fixing them fast.
Security leaders are heading into 2026 facing growing pressure from AI-driven risks, limited resources and an increasingly complex threat landscape. Sean Mack, who leads ISMG's CXO Advisor practice, joined ISMG editors to discuss how these forces are reshaping security.
AI is reshaping identity security. Praerit Garg, CEO of One Identity, said organizations should prioritize identity life cycle management and privileged access control to stay resilient against rising complexity and evolving threats.
ZeroFox has sharpened its focus on external cybersecurity by investing in threat intelligence, digital risk protection and AI models. "There are certain realities within this market that just cannot be automated at this current time," said CEO David Muse.
Sophos CEO Joe Levy says expanding identity detection and response through the Secureworks Taegis platform is critical to reducing low-hanging threats. He outlines the company's integration roadmap post-Secureworks and efforts to arm SMBs against AI-enabled attackers.
Operational technology systems use legacy protocols and allow insider access without enough oversight. Former black hat hacker Jesse McGraw breaks down why even modern security defenses would not have stopped his past attacks on physical systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.