- AI-Generated Image-Based Harm Is Becoming a Security Issue — Organizations Must Prepareon February 24, 2026 at 10:00 am
AI-generated manipulated images are getting easier to create, harder to detect, and faster to distribute.
- 41% of Organizations Have Hired a Fake Candidateon February 23, 2026 at 5:00 am
Deepfakes are leading to fraudulent job positions and hirings.
- Human-related security risks rose 90% in 2025on February 23, 2026 at 5:00 am
2025 saw a rise in AI-related security risks.
- The 25 Most Vulnerable Passwords of 2026on February 20, 2026 at 5:00 pm
Research reveals the most insecure passwords of 2026.
- Implementing Meaningful De-Escalation Training in Your Security Programon February 20, 2026 at 1:00 pm
Effective de-escalation training includes these four main focus points.
- 1.2M Bank Accounts Exposed in French National Bank Account Registry Breachon February 19, 2026 at 5:00 pm
It is currently unknown how many accounts had data accessed and/or extracted.
- Why Traditional Upskilling Strategies Fall Short in Cybersecurityby algerj@bnpmedia.com (Jordyn Alger) on February 19, 2026 at 9:00 am
Security magazine talks with Ha Hoang, CIO of Commvault, about how the modern cybersecurity talent landscape is shaping how the industry works.
- Global Leaders, Executives Exposed in Data Leakon February 18, 2026 at 1:36 pm
A financial summit accidentally exposed the passports and state identity cards of more than 700 individuals.
- Conduent Data Breach: Overview and What to Knowon February 18, 2026 at 10:00 am
This data incident is proving to have widespread repercussions.
- Security Insights Delivered Through Podcastson February 18, 2026 at 5:00 am
Listen in as security leaders discuss professional and personal stories from their security careers in episodes of Lock It Down with Security.
- Top 20 Healthcare Data Breaches of 2025on February 17, 2026 at 10:00 am
Security magazine breaks down the top 20 breaches in healthcare for 2025.
- The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engineson February 17, 2026 at 9:00 am
Internal AI assistants are a new class of exposure that most organizations are unprepared to manage.
- The Olympics Are Going Mobile — Your Security Strategy Has to Followon February 16, 2026 at 5:00 pm
European authorities are on high alert this week, citing attempted intrusions on Olympic‑adjacent targets.
- Critical Thinking Erosion: A Hidden Threat to Security Career Resilienceby jerry@smrgroup.com (Jerry J. Brennan) on February 16, 2026 at 5:00 am
While cybersecurity is vital, it is only one piece of the larger security puzzle.
- Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economyon February 13, 2026 at 7:00 pm
The six-phase playbook of how romance scams actually work.
- DHS Shutdown to Begin Saturday, February 14on February 13, 2026 at 6:00 pm
Funding for the Department of Homeland Security (DHS) will expire at 12 am on Saturday, February 14th.
- Plenty of Associations, But Not Enough Associationon February 13, 2026 at 5:00 am
Thriving in the security industry could mean joining professional associations wisely.
- Shadow AI: The Invisible Insider Threaton February 12, 2026 at 9:00 am
AI adoption in healthcare is inevitable, but it gives every clinician and staff member the potential to become an unintentional insider threat.
- 55% Healthcare Workers Faced Increases in Violence — How Is Security Adapting to Protect Them?on February 11, 2026 at 7:00 am
How are organizations responding to rising threats against healthcare staff?
- Understanding Breaches Before and After They Happen: What Every Organization Should Knowon February 10, 2026 at 9:00 am
Attackers rarely need cutting-edge tools when organizations neglect basic security hygiene.
- Epstein File Data Security Update: Raw Code Found in Emailson February 6, 2026 at 5:10 pm
Reports suggest raw email data was found in select Epstein files.
- Five Top Tips for Building a Strong Security Cultureon February 6, 2026 at 2:00 pm
Courtney Hans, Vice President of Cyber Services at ANV, shares her top five tips for building a security-first organization.
ITComposer
Work Smarter ~ Not Harder