#defensive-transformation

[ follow ]
World politics
fromThe Atlantic
13 hours ago

How Should the U.S. Military Fight?

General McChrystal's directive for restraint in Afghanistan aimed to win local support and avoid civilian casualties, despite pushback from frontline troops.
SF politics
fromThe Cipher Brief
10 hours ago

The Navy is changing the way it does business and its still pretty pricey

The USS Boise has been inactivated to reallocate resources towards new submarine classes and improve fleet readiness.
Russo-Ukrainian War
fromwww.businessinsider.com
10 hours ago

Ukraine's Patriot crews are breaking from the norm, fighting Russian threats with fewer missiles

Ukrainian soldiers are using fewer Patriot interceptors against Russian missiles due to strained stockpiles, launching only one per threat instead of the standard two to four.
#openai
Information security
fromWIRED
4 hours ago

In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model-and Strategy

OpenAI announced GPT-5.4-Cyber, emphasizing cybersecurity safeguards and the need for advanced protections in AI models.
Information security
fromWIRED
4 hours ago

In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model-and Strategy

OpenAI announced GPT-5.4-Cyber, emphasizing cybersecurity safeguards and the need for advanced protections in AI models.
#crisis-management
Marketing
fromEntrepreneur
1 day ago

In a Public Crisis, What You Prioritize Determines Whether You Execute or Stall

In a crisis, leaders must discern which voices matter to maintain control and focus on relevant stakeholders.
Mental health
fromSilicon Canals
7 hours ago

The person who thrives during a crisis and falls apart during ordinary weeks isn't broken. Their entire operating system was built for emergencies, and peace registers as a system error because they never learned what competence feels like without urgency underneath it. - Silicon Canals

Crisis-thrivers are often dysregulated, struggling with normalcy after emergencies, revealing a deeper issue with their nervous system's response to stress.
Marketing
fromEntrepreneur
1 day ago

In a Public Crisis, What You Prioritize Determines Whether You Execute or Stall

In a crisis, leaders must discern which voices matter to maintain control and focus on relevant stakeholders.
Mental health
fromSilicon Canals
7 hours ago

The person who thrives during a crisis and falls apart during ordinary weeks isn't broken. Their entire operating system was built for emergencies, and peace registers as a system error because they never learned what competence feels like without urgency underneath it. - Silicon Canals

Crisis-thrivers are often dysregulated, struggling with normalcy after emergencies, revealing a deeper issue with their nervous system's response to stress.
Europe news
fromwww.businessinsider.com
19 hours ago

The West is preparing for cheap drone attacks, but many businesses and civilians can only watch, not stop them

Civilian and corporate organizations struggle to counter small drone threats due to legal restrictions, leading to increased demand for drone detection devices.
Philosophy
fromPsychology Today
1 day ago

When Leaders Go to War, Their Psychology Goes With Them

Narcissistic leaders often emerge due to fragile egos, leading to decisions that prioritize self-preservation over the well-being of others.
UK politics
fromwww.independent.co.uk
7 hours ago

Ex-Nato chief says Starmer's complacency' on defence is putting UK in peril'

The Independent emphasizes the importance of accessible journalism and the need for funding to support on-the-ground reporting during critical times.
Social media marketing
fromAxios
6 hours ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
#us-military
Right-wing politics
fromTruthout
1 day ago

Trump's Extreme Use of Military Is Stirring a Crisis of Conscience Among Troops

Growing numbers of servicemembers oppose U.S. military actions under Trump, particularly the war on Iran, leading to increased calls for counseling services.
US news
fromNextgov.com
6 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
SF politics
fromFast Company
2 days ago

The Pentagon is doubling down on laser weapons research

The U.S. military plans to invest over $2 billion in directed energy weapons research for fiscal year 2027.
Right-wing politics
fromTruthout
1 day ago

Trump's Extreme Use of Military Is Stirring a Crisis of Conscience Among Troops

Growing numbers of servicemembers oppose U.S. military actions under Trump, particularly the war on Iran, leading to increased calls for counseling services.
US news
fromNextgov.com
6 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
SF politics
fromFast Company
2 days ago

The Pentagon is doubling down on laser weapons research

The U.S. military plans to invest over $2 billion in directed energy weapons research for fiscal year 2027.
#cybersecurity
Information security
fromTechzine Global
1 day ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Silicon Valley
fromWIRED
1 day ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Information security
fromTechzine Global
1 day ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Information security
fromFast Company
1 day ago

Why the Iran cyberattack everyone warned about hasn't really happened yet

Iran-linked hackers have conducted minor cyberattacks in the U.S. but have focused on other regions with more significant incursions.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Books
fromwww.theguardian.com
1 day ago

Can you solve it? Are you smarter than a Navy admiral?

Tanya Khovanova's book features innovative puzzles and challenges in recreational mathematics.
Roam Research
fromwww.businessinsider.com
1 day ago

The US Army surged its largest counter-drone training deployment to the Middle East during the Iran war

The US Army has launched its largest counter-drone training mission in the Middle East amid the Iran war, utilizing the Merops system.
DevOps
fromTechzine Global
1 day ago

Cloudflare introduces new features for building and deploying agents

Cloudflare is transforming AI development with Dynamic Workers, Sandboxes, and Artifacts for secure, scalable, and efficient code execution.
World news
fromwww.mediaite.com
2 days ago

Trump Reportedly Debates Restarting Limited Military Strikes' To Bring Iran Back To The Table

President Trump is considering limited military strikes against Iran following failed peace talks in Pakistan.
Careers
fromFortune
2 days ago

The middle manager cuts saving you millions today will cost you everything in 2028 | Fortune

Companies are eliminating middle managers for efficiency, but this disrupts leadership development and employee coaching, leading to long-term consequences.
Business
fromFortune
4 days ago

Defense executives worry Trump's military splurge could backfire | Fortune

Concerns arise among defense executives about the sustainability and strategic priorities of Trump's proposed military spending increase.
Privacy professionals
fromSecurityWeek
5 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
Europe politics
fromwww.dw.com
4 days ago

NATO's eastern members brace for US disengagement

Baltic states support US military actions against Iran, viewing it as essential for their security against Russian threats.
#defense-technology
Venture
from24/7 Wall St.
6 days ago

How Defense Tech Investors Are Using SHLD to Capture 21st Century Warfare Spending

Operation Absolute Resolve showcased advanced military technology, with all platforms linked to companies in the Global X Defense Tech ETF.
World politics
fromThe Cipher Brief
5 days ago

America's Drone Strategy Has a Supply Chain Problem

The U.S. defense technology ecosystem is shifting towards a model prioritizing rapid adaptation and drone technology in response to modern warfare challenges.
Venture
from24/7 Wall St.
6 days ago

How Defense Tech Investors Are Using SHLD to Capture 21st Century Warfare Spending

Operation Absolute Resolve showcased advanced military technology, with all platforms linked to companies in the Global X Defense Tech ETF.
World politics
fromThe Cipher Brief
5 days ago

America's Drone Strategy Has a Supply Chain Problem

The U.S. defense technology ecosystem is shifting towards a model prioritizing rapid adaptation and drone technology in response to modern warfare challenges.
Science
fromThe Cipher Brief
1 week ago

A Wartime Budget Without an Innovation Strategy

Collaboration between the NSF and defense sectors is essential for national security and innovation, despite proposed budget cuts to NSF funding.
Information security
fromThe Hacker News
14 hours ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
UK politics
fromwww.theguardian.com
9 hours ago

UK's armed forces are in a sad state and they have only themselves to blame

George Robertson criticizes Keir Starmer for complacency in defense investment amid growing security threats.
Russo-Ukrainian War
fromwww.businessinsider.com
1 day ago

Why Ukraine's drone defense playbook may not fully translate for countries facing Iranian threats in the Middle East

The US and allies face a drone threat in the Middle East, requiring different defense strategies than those used in Ukraine.
SF politics
fromBreaking Defense
4 days ago

Trump's $1.5T defense budget to weather harsh scrutiny on Capitol Hill - Breaking Defense

The Pentagon's $1.5 trillion budget for fiscal 2027 faces significant challenges in Congress despite meeting defense priorities.
fromwww.mediaite.com
4 days ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
Careers
fromComputerWeekly.com
4 days ago

Businesses are paying the price for CISO burnout | Computer Weekly

Burnout among CISOs poses significant risks to businesses, driven by overwhelming responsibilities and rising cyber threats.
Business
from24/7 Wall St.
6 days ago

Buy This ETF Before the Military Budget Balloons More

The White House proposed a $1.5 trillion defense budget for 2027, significantly increasing Pentagon spending.
#ai
Information security
fromSecurityWeek
11 hours ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
fromFortune
3 days ago
Artificial intelligence

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromSecuritymagazine
5 days ago

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Claude Mythos Preview enhances vulnerability detection but poses risks if misused by cybercriminals, prompting Anthropic to limit its public release.
Information security
fromSecurityWeek
11 hours ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
Artificial intelligence
fromFortune
3 days ago

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

AI companies face challenges in balancing technology use with government secrecy, highlighted by Anthropic's conflict with the Pentagon.
Artificial intelligence
fromFast Company
3 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromTechzine Global
1 day ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromSecuritymagazine
5 days ago

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Claude Mythos Preview enhances vulnerability detection but poses risks if misused by cybercriminals, prompting Anthropic to limit its public release.
UK politics
fromwww.theguardian.com
6 hours ago

The Guardian view on defence spending: should the UK's security rest with Donald Trump? | Editorial

George Robertson criticizes Britain's complacency regarding defense spending and calls for a reevaluation of its global military role and commitments.
#ukraine
Russo-Ukrainian War
fromFortune
4 days ago

Ukraine will have the most important defense industrial base in the free world, former CIA chief predicts | Fortune

Ukraine is emerging as a leading military industrial complex, producing advanced unmanned systems and reinforcing its role as the arsenal of democracy.
Russo-Ukrainian War
fromFortune
4 days ago

Ukraine will have the most important defense industrial base in the free world, former CIA chief predicts | Fortune

Ukraine is emerging as a leading military industrial complex, producing advanced unmanned systems and reinforcing its role as the arsenal of democracy.
#microsoft
Information security
fromSecurityWeek
6 hours ago

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
World news
fromTheregister
6 days ago

Microsoft hints at bit bunkers for war zones

Microsoft is redesigning datacenters in conflict-prone regions due to Iranian attacks targeting Middle Eastern facilities linked to US military operations.
Information security
fromSecurityWeek
6 hours ago

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
#us-defense-strategy
fromwww.nytimes.com
1 month ago

Opinion | If A.I. Is a Weapon, Who Should Control It?

The current collision between the Department of Defense and Anthropic over whether Anthropic's A.I. models should be bound by ethical constraints or made available for all uses the Pentagon might have in mind raises significant concerns about the future of AI governance.
Right-wing politics
fromwww.businessinsider.com
14 hours ago

We're in a new era of heightened CEO safety measures, security pros say

This attack is just shedding light on the fact that you're even more vulnerable outside of the office, said Don Aviv, CEO of Interfor International, a security consultancy.
Information security
UK politics
fromIndependent
20 hours ago

Ministerial blame game over 'send in the Army' threat

Fianna Fáil questions Fine Gael leader for not informing about a no-confidence motion vote regarding the government's fuel crisis handling.
Information security
fromArs Technica
5 hours ago

UK gov's Mythos AI tests help separate cybersecurity threat from hype

Mythos outperformed previous models in TLO tests, showing capability in attacking vulnerable systems but still facing limitations in complex scenarios.
fromThe Cipher Brief
5 days ago

Drones Are Changing Warfare And America Isn't Ready

The U.S. has discovered that air superiority and missile defense systems designed to counter tens/hundreds of aircraft and missiles is insufficient against asymmetric attacks of thousands of drones.
Russo-Ukrainian War
Information security
fromSecurityWeek
15 hours ago

Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities

CISA expanded its Known Exploited Vulnerabilities catalog with seven new vulnerabilities, including critical Windows and Adobe flaws.
World politics
fromwww.businessinsider.com
2 weeks ago

Total air defense is effectively impossible. In a major war, the West may have to make hard choices.

The West must make difficult choices about air defense priorities in large-scale wars due to limitations in resources and technology.
#cybersecurity-strategy
fromSecurityWeek
1 month ago
Information security

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

US politics
fromNextgov.com
1 month ago

Trump's new cyber strategy details more offensive response to cyber threats

The White House released a national cybersecurity strategy prioritizing direct adversarial response, critical infrastructure protection, and offensive cyber capabilities alongside defensive measures.
Information security
fromSecurityWeek
1 month ago

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

Trump administration releases comprehensive cyber strategy emphasizing government-private sector coordination, deterrence, regulatory reform, and investment in AI and quantum technologies to strengthen national cybersecurity.
US politics
fromFortune
1 month ago

Pentagon officially defines Anthropic as 'supply chain risk' | Fortune

The Trump administration designated Anthropic as a supply chain risk, forcing government contractors to stop using Claude AI due to national security concerns over surveillance and autonomous weapons capabilities.
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
fromSecurityWeek
4 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
Information security
fromTechRepublic
6 days ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
Information security
fromSecuritymagazine
1 week ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
#ai-cybersecurity
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromZDNET
3 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromZDNET
3 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
fromNextgov.com
1 month ago

US cyber responses will be 'linked to adversary actions' and involve industry coordination, official says

Future U.S. government responses in cyberspace will be "linked to adversary actions" and will involve coordination between the private sector and smaller governments, a top White House official said Thursday. The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries' actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.
US politics
US politics
fromwww.dw.com
2 months ago

US defense plan focuses on homeland, limits help to allies

The US will prioritize homeland defense and counter Chinese influence in the Indo-Pacific while expecting allies to assume greater defense responsibilities with reduced US support.
fromThe Atlantic
2 months ago

Whatever This Is, It Is Not Strategy

But logistical consistency, like coherence and gravitas, does not characterize the new NDS. It is a document that supposedly nests within the National Security Strategy, explaining at greater length the implications of overall policy for the armed forces. The 2026 version does not do that. Rather, it restates some of the basic priorities of the Trump administration but for the most part confines itself to flattery of the president, insults, and bombast.
US politics
Information security
fromSecuritymagazine
1 month ago

Security Leaders Discuss Trump's Cyber Strategy for America

The Trump Administration released a cyber strategy with six pillars addressing adversary capacity, regulation, federal and critical infrastructure security, emerging technology innovation, and workforce development.
Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
[ Load more ]