#safety-run-defense

[ follow ]
#crisis-management
Marketing
fromEntrepreneur
1 day ago

In a Public Crisis, What You Prioritize Determines Whether You Execute or Stall

In a crisis, leaders must discern which voices matter to maintain control and focus on relevant stakeholders.
Mental health
fromSilicon Canals
9 hours ago

The person who thrives during a crisis and falls apart during ordinary weeks isn't broken. Their entire operating system was built for emergencies, and peace registers as a system error because they never learned what competence feels like without urgency underneath it. - Silicon Canals

Crisis-thrivers are often dysregulated, struggling with normalcy after emergencies, revealing a deeper issue with their nervous system's response to stress.
Marketing
fromEntrepreneur
1 day ago

In a Public Crisis, What You Prioritize Determines Whether You Execute or Stall

In a crisis, leaders must discern which voices matter to maintain control and focus on relevant stakeholders.
Mental health
fromSilicon Canals
9 hours ago

The person who thrives during a crisis and falls apart during ordinary weeks isn't broken. Their entire operating system was built for emergencies, and peace registers as a system error because they never learned what competence feels like without urgency underneath it. - Silicon Canals

Crisis-thrivers are often dysregulated, struggling with normalcy after emergencies, revealing a deeper issue with their nervous system's response to stress.
fromwww.businessinsider.com
16 hours ago

We're in a new era of heightened CEO safety measures, security pros say

This attack is just shedding light on the fact that you're even more vulnerable outside of the office, said Don Aviv, CEO of Interfor International, a security consultancy.
Information security
Deliverability
fromZDNET
35 minutes ago

This simple email trick saves me from annoying marketing spam (and it's free to do)

Using a dedicated shopping email can effectively reduce spam and clutter in your primary inbox.
UK politics
fromComputerWeekly.com
18 hours ago

Flood warning: How citizens' AI agents will swamp public services | Computer Weekly

AI has the potential to transform public services by reducing user friction and improving access for citizens.
Productivity
fromSilicon Canals
6 hours ago

The workers most likely to burn out aren't always the ones doing the most - they're the ones who can't tell the difference between urgent and important - Silicon Canals

Workers overwhelmed by urgency rather than importance are more likely to experience burnout.
#cybersecurity
Information security
fromTechzine Global
1 day ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Higher education
fromNextgov.com
7 hours ago

CISA cancels CyberCorps summer internship hiring amid DHS shutdown

CISA reversed its decision to onboard summer interns due to a funding lapse in the Department of Homeland Security.
Silicon Valley
fromWIRED
1 day ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
4 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromTechzine Global
1 day ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
SOMA, SF
fromKqed
10 hours ago

DOJ: Man Who Attacked Sam Altman's House Threatened to Kill Other Tech CEOs | KQED

A Texas man faces charges for attempted murder of OpenAI CEO Sam Altman after violent attacks at his home and company headquarters.
Psychology
fromwww.theguardian.com
10 hours ago

Always in crisis mode? You might be catastrophizing here's how to stop

Catastrophizing is a cognitive distortion where individuals jump to the worst possible conclusions, often leading to chronic distress and mental health issues.
fromJezebel
5 hours ago

Only the Trump Administration Could Employ a FEMA Official Who Claims He Can Teleport and See Ghosts

Gregg Phillips claimed that he has in several instances 'teleported,' once into a Georgia Waffle House 50 miles away, where I can only assume a freshly made All-Star Special was waiting for him.
Washington DC
UX design
fromFast Company
21 hours ago

5 signs your team isn't aligned even if they're all nodding

Illusion of alignment in teams leads to miscommunication and inefficiency, causing frustration and wasted energy.
Europe news
fromwww.businessinsider.com
21 hours ago

The West is preparing for cheap drone attacks, but many businesses and civilians can only watch, not stop them

Civilian and corporate organizations struggle to counter small drone threats due to legal restrictions, leading to increased demand for drone detection devices.
fromIndependent
1 day ago

Counter-terror unit probing threat to bomb a garda station if officers 'get heavy handed' with protesters

A bomb threat was sent to Garda Headquarters, warning that a device would be detonated near a garda station if authorities acted heavily against fuel protesters.
Germany news
Social justice
fromPsychology Today
1 day ago

Resilience and Reconstruction in Practice

A long-term approach is essential for supporting displaced individuals, emphasizing identity continuity and meaningful work for resilience.
fromArs Technica
1 day ago

Your tech support company runs scams. Stop-or disguise with more fraud?

Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Privacy professionals
Philosophy
fromPsychology Today
1 day ago

When Leaders Go to War, Their Psychology Goes With Them

Narcissistic leaders often emerge due to fragile egos, leading to decisions that prioritize self-preservation over the well-being of others.
Careers
fromEntrepreneur
1 day ago

5 Books That Will Help You Navigate Change and Stay Resilient at Work

Building resilient teams is essential in a rapidly changing labor market influenced by economic uncertainty and evolving workforce dynamics.
DevOps
fromTechzine Global
1 day ago

Cloudflare introduces new features for building and deploying agents

Cloudflare is transforming AI development with Dynamic Workers, Sandboxes, and Artifacts for secure, scalable, and efficient code execution.
EU data protection
fromInfoQ
2 days ago

How SBOMs and Engineering Discipline Can Help You Avoid Trivy's Compromise

SBOMs are essential for developers to enhance security and comply with new legislative requirements.
Education
fromSecuritymagazine
5 days ago

School's Out, But Security's Not: Preparing for K-12 Summertime Security

Summer vacation does not reduce security threats in K-12 environments; instead, the nature of risks changes significantly.
Online learning
fromMedium
2 days ago

Designing adaptive teams

Organizations must cultivate a collective capacity to learn faster than competitors to achieve sustainable competitive advantage.
SF politics
fromWIRED
5 days ago

Politicians Are Spending More Money on Security as They Increasingly Become Targets

Federal campaign spending on security for the 2024 election cycle exceeds five times that of the 2016 election due to rising threats against public servants.
#openai
Information security
fromWIRED
6 hours ago

In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model-and Strategy

OpenAI announced GPT-5.4-Cyber, emphasizing cybersecurity safeguards and the need for advanced protections in AI models.
Information security
fromAxios
6 hours ago

OpenAI expands access to cyber AI as hacking risks grow

OpenAI is shifting to a model that emphasizes identity verification for access to sensitive cybersecurity tools while expanding availability.
Information security
fromWIRED
6 hours ago

In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model-and Strategy

OpenAI announced GPT-5.4-Cyber, emphasizing cybersecurity safeguards and the need for advanced protections in AI models.
Information security
fromAxios
6 hours ago

OpenAI expands access to cyber AI as hacking risks grow

OpenAI is shifting to a model that emphasizes identity verification for access to sensitive cybersecurity tools while expanding availability.
Psychology
fromSilicon Canals
1 day ago

Neuroscience reveals that the calmest person in any crisis isn't naturally fearless - their brain learned to delay panic because their childhood required them to be functional before they were allowed to be afraid - Silicon Canals

Calmness under pressure is a learned response, not merely a personality trait or temperament.
Mental health
fromPsychology Today
1 day ago

When Trauma Awareness Stops at the Hospital Door

Chronic health conditions significantly impact psychological well-being, yet healthcare providers often neglect this aspect for both patients and themselves.
World politics
fromThe Atlantic
15 hours ago

How Should the U.S. Military Fight?

General McChrystal's directive for restraint in Afghanistan aimed to win local support and avoid civilian casualties, despite pushback from frontline troops.
Social justice
fromGothamist
1 day ago

Can Columbus, Ohio teach the NYPD about crowd control? Mamdani wants to find out.

Columbus emphasizes conversation and de-escalation in protest policing, contrasting with aggressive tactics historically used by the NYPD.
Education
fromPsychology Today
3 days ago

Using Human Kindness as a Shield Against School Violence

Billions are wasted on ineffective security measures for schools instead of investing in mental health resources and social support systems.
Privacy professionals
fromSecurityWeek
5 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
Remote teams
from3blmedia
1 week ago

Why Traditional Evacuation Plans Fall Short in Hybrid Work

Hybrid work complicates evacuation plans, creating gaps when designated safety personnel are absent, necessitating a shift to more inclusive safety strategies.
#ai
Information security
fromSecurityWeek
13 hours ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromTechzine Global
1 day ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Artificial intelligence
fromFast Company
3 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromSecurityWeek
13 hours ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Careers
fromComputerWeekly.com
4 days ago

Businesses are paying the price for CISO burnout | Computer Weekly

Burnout among CISOs poses significant risks to businesses, driven by overwhelming responsibilities and rising cyber threats.
#microsoft
Information security
fromSecurityWeek
8 hours ago

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
Information security
fromSecurityWeek
8 hours ago

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
Podcast
fromSecuritymagazine
3 weeks ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
Information security
fromThe Hacker News
16 hours ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
Information security
fromSecurityWeek
9 hours ago

Adobe Patches 55 Vulnerabilities Across 11 Products

Adobe's Patch Tuesday updates address 55 vulnerabilities across 11 products, with critical ColdFusion flaws requiring immediate attention.
World politics
fromThe Cipher Brief
3 weeks ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
Information security
fromSecurityWeek
17 hours ago

Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities

CISA expanded its Known Exploited Vulnerabilities catalog with seven new vulnerabilities, including critical Windows and Adobe flaws.
Information security
fromArs Technica
7 hours ago

UK gov's Mythos AI tests help separate cybersecurity threat from hype

Mythos outperformed previous models in TLO tests, showing capability in attacking vulnerable systems but still facing limitations in complex scenarios.
#phishing
Information security
fromTechzine Global
16 hours ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Information security
fromBusiness Matters
3 weeks ago

How to build an effective employee phishing training program in 2026

Effective employee phishing training programs focus on behavior change and continuous education to reduce security risks and improve reporting rates.
Information security
fromTechzine Global
16 hours ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Information security
fromBusiness Matters
3 weeks ago

How to build an effective employee phishing training program in 2026

Effective employee phishing training programs focus on behavior change and continuous education to reduce security risks and improve reporting rates.
fromFinbold
14 hours ago

Kraken insider extortion reveals remote work security blind spot

"Shortly after access was terminated, we began receiving extortion demands. The criminals threatened to distribute materials from both the February 2025 incident and the recent incident to media outlets and on social media if we did not comply. We will not pay these criminals," Percoco stated.
Information security
#data-breach
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Information security
fromTheregister
1 week ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Information security
fromTheregister
1 week ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
fromBuzzFeed
1 month ago

First Responders Are Calling Out The "Fatal" Safety Mistakes You Should Never, Ever Make

If you are choking and are alone, try to get yourself into a high-traffic area, such as a hallway in a building or outside your house. If you pass out, you're way more likely to be found as opposed to being in a room in a building or your house. Call 911 even though you can't speak. Someone will be sent to your location by dispatch.
Public health
Gadgets
fromNextgov.com
2 months ago

When every second counts: government tech helps first responders' lifesaving missions

Indoor-capable drones and indoor location-tracking technologies significantly improve first responder situational awareness and reduce risk in hazardous interior environments.
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
Public health
fromBuzzFeed
2 months ago

First Responders Are Calling Out The "Fatal" Safety Mistakes You Need To Stop Making ASAP

Home medical oxygen increases fire risk; secure and store cylinders properly, avoid ignition sources, and use smoke alarms and warning signs.
fromSecurityWeek
4 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
#ai-cybersecurity
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromZDNET
3 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromZDNET
3 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

Information security
fromTechRepublic
6 days ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
Mental health
fromSecuritymagazine
1 month ago

Implementing Meaningful De-Escalation Training in Your Security Program

De-escalation training reduces aggressive incidents and is a critical risk-mitigation strategy for modern security personnel and organizations.
Information security
fromSecuritymagazine
1 week ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#executive-protection
Information security
fromSecuritymagazine
2 weeks ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecuritymagazine
2 weeks ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecuritymagazine
1 month ago

Discussing Use of Force in Security: A Challenging Discussion?

Use of force in security cannot be entirely avoided but should be deployed only as a last resort when lesser options fail, requiring comprehensive training in tactics, de-escalation, and legal authority.
Information security
fromSecurityWeek
1 month ago

How to 10x Your Vulnerability Management Program in the Agentic Era

Agentic AI cyberattacks are actively occurring, forcing vulnerability management to evolve from static scanning to continuous, contextual, autonomous remediation systems.
Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
#incident-response
fromSecuritymagazine
2 months ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
fromSecuritymagazine
1 month ago

Strategies for Security Leaders in the Midst of Skill Shortages

Organizations have reported heightened cybersecurity risks as a result of these skill shortages, but the issues don't end there. Many teams will also experience burnout, which is an issue for security teams even in the best of times, which can only add to the talent gap concern if burnt out employees leave the industry.
Information security
Information security
fromThe Hacker News
1 month ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
Information security
fromSecuritymagazine
2 months ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
Information security
fromBusiness Matters
1 month ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
[ Load more ]