The Last Watchdog

article thumbnail

News alert: Seraphic launches BrowserTotal™ — a free AI-powered tool to stress test browser security

The Last Watchdog

Tel Aviv, Israel, June 9, 2025, CyberNewswire — Seraphic Security , a leader in enterprise browser security, today announced the launch of Browser Total , a unique and proprietary public service enabling enterprises to assess their browser security posture in real-time. The launch coincides with the Gartner Security & Risk Management Summit 2025, where Seraphic will be showcasing the new platform with live demos at booth #1257.

Marketing 130
article thumbnail

Shared Intel Q&A: Can risk-informed patching finally align OT security with real-world threats?

The Last Watchdog

Cyber threats to the U.S. electric grid are mounting. Attackers—from nation-state actors to ransomware gangs—are growing more creative and persistent in probing utility networks and operational technology systems that underpin modern life. Related: The evolution of OT security And yet, many utility companies remain trapped in a compliance-first model that often obscures real risks rather than addressing them.

Risk 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Are we ‘Super f**cked’ by AI? — debate gets 10 million-plus views on YouTube

The Last Watchdog

The day after my column dissecting Chris Sacca’s viral outburst went live—his now-notorious claim that we are “super f**ked” by artificial intelligence—I stumbled onto another AI conversation that had already amassed over 10 million views: a roundtable debate hosted by Steven Bartlett on his widely watched YouTube show, Diary of a CEO.

article thumbnail

News alert: $198K in Grants Awarded to Boost Cybersecurity Workforce in Massachusetts

The Last Watchdog

Boston, MA, Jun. 4, 2025, The Healey-Driscoll administration and Massachusetts Technology Collaboratives (MassTech) MassCyberCenter awarded $198,542 to four Massachusetts-based programs focused on preparing professionals for the cybersecurity workforce.MassTech provided the funds through the Alternative Cyber Career Education (ACE) Grant Program , a statewide effort to support young adults and retrain existing professionals with alternative options to traditional cybersecurity degree programs.

article thumbnail

SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?

The Last Watchdog

As enterprise adoption of generative AI accelerates, security teams face a new identity dilemma not just more users and devices, but a growing swarm of non-human agents and autonomous systems requesting access to sensitive assets. Related: Top 10 Microsoft Copilot risks At the same time, traditional identity and access management (IAM) tools are buckling under the pressure of cloud sprawl, decentralized architectures, and constant change.

IoT 130
article thumbnail

RSAC Fireside Chat: Human and machine identity risks are converging — and they’re finally visible

The Last Watchdog

Non-human service accounts have quietly become one of the biggest liabilities in enterprise security. Related: Why identity is the cornerstone of cyber defense These machine credentials used to automate connections between systems now outnumber humans by 30 to 1. That gap is likely even wider in cloud-intensive environments. Yet despite their scale, service accounts remain largely invisible to traditional IAM and PAM systems.

Risk 130
article thumbnail

RSAC Fireside Chat: Cyber risk mitigation turns personal–defending the CEO as an attack vector

The Last Watchdog

Executives are under digital siege and most don’t even know it. Related: Shareholders sue over murder At RSAC 2025, I sat down with Chuck Randolph , SVP of Strategic Intelligence and Security at 360 Privacy , to unpack a trend reshaping the threat landscape: the weaponization of personal data against corporate leaders and high-net-worth individuals.