Explore tweets tagged as #SCMagazine
@Corix_JC
JC Gaillard
15 hours
Tweet media one
2
3
10
@SCMagazine
SC Media
3 hours
.@PaloAltoNtwks agreed to acquire major identity provider @CyberArk for $25 billion, marking what many security pros are calling an “inflection point” for identity security awareness. #IAM #cybersecurity #infosec
1
0
2
@SCMagazine
SC Media
1 hour
The traditional model of network security has been disrupted by several key trends, said @PaloAltoNtwks' Prakash Rajamani in a recent SC Media webcast: the COVID-19 pandemic, widespread remote work, and rapid cloud adoption. #AI #cybersecurity #infosec
1
0
0
@SCMagazine
SC Media
7 minutes
A prolonged China-linked espionage campaign called Fire Ant was discovered targeting virtualization and networking infrastructure, primarily VMware ESXi and vCenter environments and F5 networking appliances, according to @sygnia_labs research. #infosec
1
0
0
@SCMagazine
SC Media
2 hours
Nearly 22% of files and more than 4% of prompts employees send to generative AI (GenAI) tools contain sensitive information, according to an analysis published by @harmonicsec. #cybersecurity #AI #infosec
1
1
1
@Transform_Sec
The Security Transformation Research Foundation
4 days
Tweet media one
0
3
5
@Transform_Sec
The Security Transformation Research Foundation
6 days
Tweet media one
0
3
3
@Transform_Sec
The Security Transformation Research Foundation
2 months
Tweet media one
0
4
10
@SCMagazine
SC Media
6 hours
The @CISAgov placed two critical 10.0 @Cisco Identity Service Engine (ISE) bugs on its Known Exploited Vulnerabilities (KEV) list. #cybersecurity #infosec #ITsecurity
0
2
2
@Nasuni
Nasuni
1 month
Nasuni’s Nick Burling discusses how the misalignment between #AI plans and deployments is most pronounced in larger organizations. Read more from @SCMagazine! #Nasuni #DataIntelligence #Cybersecurity #DataStrategy
Tweet media one
0
0
1
@Transform_Sec
The Security Transformation Research Foundation
2 months
Tweet media one
1
5
8
@Transform_Sec
The Security Transformation Research Foundation
2 months
Tweet media one
0
3
7
@SCMagazine
SC Media
5 hours
AI large language models (LLMs) generated insecure code for nearly half of tasks in a study conducted for @Veracode’s 2025 GenAI Code Security Report. #AI #cybersecurity #infosec #ITsecurity
1
3
2
@EricssonEnt
Ericsson Enterprise Wireless Solutions
2 months
BYOD, third parties, and IoT are here to stay. So how do you secure what you can’t control?. In @scmagazine we make the case for clientless #ZTNA as the future of secure remote access. Check it out 👉
1
1
2