CINXE.COM
Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training | CyberScoop
<!DOCTYPE html> <html lang="en-US" class="no-js"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1" /> <script>(function(html){html.className = html.className.replace(/\bno-js\b/,'js')})(document.documentElement);</script> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- This site is optimized with the Yoast SEO Premium plugin v21.7 (Yoast SEO v21.7) - https://yoast.com/wordpress/plugins/seo/ --> <title>Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training | CyberScoop</title> <meta name="description" content="How generative AI provides one potential lever organizations can pull to scale human-led cyber defenses across the enterprise." /> <link rel="canonical" href="https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training" /> <meta property="og:description" content="How generative AI provides one potential lever organizations can pull to scale human-led cyber defenses across the enterprise." /> <meta property="og:url" content="https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/" /> <meta property="og:site_name" content="CyberScoop" /> <meta property="article:published_time" content="2024-06-28T19:38:41+00:00" /> <meta property="article:modified_time" content="2024-07-31T21:31:58+00:00" /> <meta property="og:image" content="https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Screenshot-2024-07-23-at-10.01.14 AM.png" /> <meta property="og:image:width" content="681" /> <meta property="og:image:height" content="520" /> <meta property="og:image:type" content="image/png" /> <meta name="author" content="Wyatt Kash" /> <meta name="twitter:card" content="summary_large_image" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/","url":"https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/","name":"Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training | CyberScoop","isPartOf":{"@id":"https://cyberscoop.com/#website"},"primaryImageOfPage":{"@id":"https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/#primaryimage"},"image":{"@id":"https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/#primaryimage"},"thumbnailUrl":"https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Screenshot-2024-07-23-at-10.01.14 AM.png","datePublished":"2024-06-28T19:38:41+00:00","dateModified":"2024-07-31T21:31:58+00:00","description":"How generative AI provides one potential lever organizations can pull to scale human-led cyber defenses across the enterprise.","breadcrumb":{"@id":"https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/#primaryimage","url":"https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Screenshot-2024-07-23-at-10.01.14 AM.png","contentUrl":"https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Screenshot-2024-07-23-at-10.01.14 AM.png","width":681,"height":520,"caption":"Photo illustration of AI and security."},{"@type":"BreadcrumbList","@id":"https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://cyberscoop.com/"},{"@type":"ListItem","position":2,"name":"Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training"}]},{"@type":"WebSite","@id":"https://cyberscoop.com/#website","url":"https://cyberscoop.com/","name":"CyberScoop","description":"","publisher":{"@id":"https://cyberscoop.com/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://cyberscoop.com/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://cyberscoop.com/#organization","name":"CyberScoop","url":"https://cyberscoop.com/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://cyberscoop.com/#/schema/logo/image/","url":"https://cyberscoop.com/wp-content/uploads/sites/3/2023/01/CyberScoop-Black.png","contentUrl":"https://cyberscoop.com/wp-content/uploads/sites/3/2023/01/CyberScoop-Black.png","width":1545,"height":186,"caption":"CyberScoop"},"image":{"@id":"https://cyberscoop.com/#/schema/logo/image/"}}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//securepubads.g.doubleclick.net' /> <link rel='dns-prefetch' href='//use.typekit.net' /> <link rel="alternate" type="application/rss+xml" title="CyberScoop » Feed" href="https://cyberscoop.com/feed/" /> <link rel="alternate" type="application/rss+xml" title="CyberScoop » Comments Feed" href="https://cyberscoop.com/comments/feed/" /> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/cyberscoop.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.7.2"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <style id='wp-emoji-styles-inline-css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='all-css-2' href='https://cyberscoop.com/wp-includes/css/dist/block-library/style.min.css?m=1739294329g' type='text/css' media='all' /> <style id='wp-parsely-recommendations-style-inline-css'> .parsely-recommendations-list-title{font-size:1.2em}.parsely-recommendations-list{list-style:none;padding:unset}.parsely-recommendations-cardbody{overflow:hidden;padding:.8em;text-overflow:ellipsis;white-space:nowrap}.parsely-recommendations-cardmedia{padding:.8em .8em 0} </style> <style id='elasticpress-facet-style-inline-css'> .widget_ep-facet input[type=search],.wp-block-elasticpress-facet input[type=search]{margin-bottom:1rem}.widget_ep-facet .searchable .inner,.wp-block-elasticpress-facet .searchable .inner{max-height:20em;overflow:scroll}.widget_ep-facet .term.hide,.wp-block-elasticpress-facet .term.hide{display:none}.widget_ep-facet .empty-term,.wp-block-elasticpress-facet .empty-term{opacity:.5;position:relative}.widget_ep-facet .empty-term:after,.wp-block-elasticpress-facet .empty-term:after{bottom:0;content:" ";display:block;left:0;position:absolute;right:0;top:0;width:100%;z-index:2}.widget_ep-facet .level-1,.wp-block-elasticpress-facet .level-1{padding-left:20px}.widget_ep-facet .level-2,.wp-block-elasticpress-facet .level-2{padding-left:40px}.widget_ep-facet .level-3,.wp-block-elasticpress-facet .level-3{padding-left:60px}.widget_ep-facet .level-4,.wp-block-elasticpress-facet .level-4{padding-left:5pc}.widget_ep-facet .level-5,.wp-block-elasticpress-facet .level-5{padding-left:75pt}.widget_ep-facet input[disabled],.wp-block-elasticpress-facet input[disabled]{cursor:pointer;opacity:1}.widget_ep-facet .term a,.wp-block-elasticpress-facet .term a{-webkit-box-align:center;-ms-flex-align:center;align-items:center;display:-webkit-box;display:-ms-flexbox;display:flex;position:relative}.widget_ep-facet .term a:hover .ep-checkbox,.wp-block-elasticpress-facet .term a:hover .ep-checkbox{background-color:#ccc}.ep-checkbox{-webkit-box-align:center;-ms-flex-align:center;-ms-flex-negative:0;-webkit-box-pack:center;-ms-flex-pack:center;align-items:center;background-color:#eee;display:-webkit-box;display:-ms-flexbox;display:flex;flex-shrink:0;height:1em;justify-content:center;margin-right:.25em;width:1em}.ep-checkbox:after{border:solid #fff;border-width:0 .125em .125em 0;content:"";display:none;height:.5em;-webkit-transform:rotate(45deg);transform:rotate(45deg);width:.25em}.ep-checkbox.checked{background-color:#5e5e5e}.ep-checkbox.checked:after{display:block} </style> <link rel='stylesheet' id='all-css-6' href='https://cyberscoop.com/wp-content/mu-plugins/search/elasticpress/dist/css/related-posts-block-styles.min.css?m=1739821441g' type='text/css' media='all' /> <style id='global-styles-inline-css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--font-family--kepler-serif: 'kepler-std', serif;--wp--preset--font-family--georgia-serif: 'georgia', 'times new roman', serif;--wp--preset--font-family--sans-serif: 'sofia-pro', sans-serif;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);--wp--custom--color--primary--black: #000;--wp--custom--color--primary--red: #e71319;--wp--custom--color--primary--pink: #FE009A;--wp--custom--color--primary--white: #fff;--wp--custom--color--secondary--dark-gray: #505050;--wp--custom--color--secondary--gray: #767676;--wp--custom--color--secondary--light-gray: #f2f2f2;--wp--custom--color--secondary--cool-gray: #d5d7d8;--wp--custom--spacing--8: 0.5rem;--wp--custom--spacing--16: 1rem;--wp--custom--spacing--20: 1.25rem;--wp--custom--spacing--24: 1.5rem;--wp--custom--spacing--32: 2rem;--wp--custom--spacing--40: 2.5rem;--wp--custom--spacing--48: 3rem;--wp--custom--spacing--64: 4rem;--wp--custom--spacing--80: 5rem;--wp--custom--spacing--128: 8rem;--wp--custom--typography--font--size--10: 0.625rem;--wp--custom--typography--font--size--13: 0.812rem;--wp--custom--typography--font--size--16: 1rem;--wp--custom--typography--font--size--18: 1.125rem;--wp--custom--typography--font--size--20: 1.25rem;--wp--custom--typography--font--size--22: 1.375rem;--wp--custom--typography--font--size--24: 1.5rem;--wp--custom--typography--font--size--25: 1.563rem;--wp--custom--typography--font--size--30: 1.875rem;--wp--custom--typography--font--size--31: 1.953rem;--wp--custom--typography--font--size--32: 2rem;--wp--custom--typography--font--size--34: 2.125rem;--wp--custom--typography--font--size--36: 2.25rem;--wp--custom--typography--font--size--39: 2.441rem;--wp--custom--typography--font--size--40: 2.5rem;--wp--custom--typography--font--size--42: 2.625rem;--wp--custom--typography--font--size--48: 3rem;--wp--custom--typography--font--size--49: 3.052rem;--wp--custom--typography--font--size--54: 3.375rem;--wp--custom--typography--font--size--61: 3.815rem;--wp--custom--typography--font--size--h-1: var(--font-size-h1);--wp--custom--typography--font--size--h-2: var(--font-size-h2);--wp--custom--typography--font--size--h-3: var(--font-size-h3);--wp--custom--typography--font--size--h-4: var(--font-size-h4);--wp--custom--typography--font--size--h-5: var(--font-size-h5);--wp--custom--typography--font--size--h-6: var(--font-size-h6);--wp--custom--typography--font--size--small: var(--font-size-small);--wp--custom--typography--font--size--default: var(--font-size-default);--wp--custom--typography--font--size--large: var(--font-size-large);--wp--custom--typography--font--weight--normal: 400;--wp--custom--typography--font--weight--medium: 500;--wp--custom--typography--font--weight--bold: 700;--wp--custom--width--content--default: 54.0625rem;--wp--custom--width--content--wide: 81.75rem;--wp--custom--width--content--full: none;}.wp-block-cover{--wp--preset--color--white: var(--wp--custom--color--primary--white);--wp--preset--color--light-gray: var(--wp--custom--color--secondary--light-gray);--wp--preset--color--black: var(--wp--custom--color--primary--black);}.wp-block-group{--wp--preset--color--white: var(--wp--custom--color--primary--white);--wp--preset--color--light-gray: var(--wp--custom--color--secondary--light-gray);}.wp-block-heading{--wp--preset--font-size--h-1: var(--wp--custom--typography--font--size--h-1);--wp--preset--font-size--h-2: var(--wp--custom--typography--font--size--h-2);--wp--preset--font-size--h-3: var(--wp--custom--typography--font--size--h-3);--wp--preset--font-size--h-4: var(--wp--custom--typography--font--size--h-4);--wp--preset--font-size--h-5: var(--wp--custom--typography--font--size--h-5);--wp--preset--font-size--h-6: var(--wp--custom--typography--font--size--h-6);}p{--wp--preset--font-size--small: var(--wp--custom--typography--font--size--small);--wp--preset--font-size--default: var(--wp--custom--typography--font--size--default);--wp--preset--font-size--large: var(--wp--custom--typography--font--size--large);}:root { --wp--style--global--content-size: var(--wp--custom--width--content--default);--wp--style--global--wide-size: var(--wp--custom--width--content--wide); }:where(body) { margin: 0; }.wp-site-blocks > .alignleft { float: left; margin-right: 2em; }.wp-site-blocks > .alignright { float: right; margin-left: 2em; }.wp-site-blocks > .aligncenter { justify-content: center; margin-left: auto; margin-right: auto; }:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}.is-layout-flow > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}.is-layout-flow > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-flow > .aligncenter{margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}.is-layout-constrained > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-constrained > .aligncenter{margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > :where(:not(.alignleft):not(.alignright):not(.alignfull)){max-width: var(--wp--style--global--content-size);margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > .alignwide{max-width: var(--wp--style--global--wide-size);}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}body{padding-top: 0px;padding-right: 0px;padding-bottom: 0px;padding-left: 0px;}a:where(:not(.wp-element-button)){text-decoration: underline;}:root :where(.wp-element-button, .wp-block-button__link){background-color: #32373c;border-width: 0;color: #fff;font-family: inherit;font-size: inherit;line-height: inherit;padding: calc(0.667em + 2px) calc(1.333em + 2px);text-decoration: none;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;}.has-kepler-serif-font-family{font-family: var(--wp--preset--font-family--kepler-serif) !important;}.has-georgia-serif-font-family{font-family: var(--wp--preset--font-family--georgia-serif) !important;}.has-sans-serif-font-family{font-family: var(--wp--preset--font-family--sans-serif) !important;}.wp-block-cover.has-white-color{color: var(--wp--preset--color--white) !important;}.wp-block-cover.has-light-gray-color{color: var(--wp--preset--color--light-gray) !important;}.wp-block-cover.has-black-color{color: var(--wp--preset--color--black) !important;}.wp-block-cover.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.wp-block-cover.has-light-gray-background-color{background-color: var(--wp--preset--color--light-gray) !important;}.wp-block-cover.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.wp-block-cover.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.wp-block-cover.has-light-gray-border-color{border-color: var(--wp--preset--color--light-gray) !important;}.wp-block-cover.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.wp-block-group.has-white-color{color: var(--wp--preset--color--white) !important;}.wp-block-group.has-light-gray-color{color: var(--wp--preset--color--light-gray) !important;}.wp-block-group.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.wp-block-group.has-light-gray-background-color{background-color: var(--wp--preset--color--light-gray) !important;}.wp-block-group.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.wp-block-group.has-light-gray-border-color{border-color: var(--wp--preset--color--light-gray) !important;}.wp-block-heading.has-h-1-font-size{font-size: var(--wp--preset--font-size--h-1) !important;}.wp-block-heading.has-h-2-font-size{font-size: var(--wp--preset--font-size--h-2) !important;}.wp-block-heading.has-h-3-font-size{font-size: var(--wp--preset--font-size--h-3) !important;}.wp-block-heading.has-h-4-font-size{font-size: var(--wp--preset--font-size--h-4) !important;}.wp-block-heading.has-h-5-font-size{font-size: var(--wp--preset--font-size--h-5) !important;}.wp-block-heading.has-h-6-font-size{font-size: var(--wp--preset--font-size--h-6) !important;}p.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}p.has-default-font-size{font-size: var(--wp--preset--font-size--default) !important;}p.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='all-css-8' href='https://cyberscoop.com/wp-content/themes/scoopnewsgroup/dist/css/frontend.css?m=1739308213g' type='text/css' media='all' /> <link rel='stylesheet' id='typekit-css' href='https://use.typekit.net/itk2qbh.css?ver=5e4722b3d0055288d011' media='all' /> <script type="text/javascript" src="https://cyberscoop.com/_static/??-eJzTLy/QzcxLzilNSS3WzwKiwtLUokoopZebmaeXVayjj0+Rbm5melFiSSpUsX2uraG5saWRpYmxsUEWAK+aIiE=" ></script><script type="text/javascript" src="https://securepubads.g.doubleclick.net/tag/js/gpt.js" id="gpt-js"></script> <link rel="https://api.w.org/" href="https://cyberscoop.com/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://cyberscoop.com/wp-json/wp/v2/posts/80844" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://cyberscoop.com/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress 6.7.2" /> <link rel='shortlink' href='https://cyberscoop.com/?p=80844' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://cyberscoop.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fcyberscoop.com%2Fwant-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://cyberscoop.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fcyberscoop.com%2Fwant-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training%2F&format=xml" /> <script> // Block presence of other buttons window.__Marker = {}; </script><script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training","url":"http:\/\/cyberscoop.com\/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/cyberscoop.com\/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training\/"},"thumbnailUrl":"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2024\/06\/Screenshot-2024-07-23-at-10.01.14\u202fAM.png?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2024\/06\/Screenshot-2024-07-23-at-10.01.14\u202fAM.png"},"articleSection":"Sponsored Content","author":[{"@type":"Person","name":"Jay Bhalodia","url":"https:\/\/cyberscoop.com\/author\/jay-bhalodia\/"}],"creator":["Jay Bhalodia"],"publisher":{"@type":"Organization","name":"CyberScoop","logo":"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png"},"keywords":[],"dateCreated":"2024-06-28T19:38:41Z","datePublished":"2024-06-28T19:38:41Z","dateModified":"2024-07-31T21:31:58Z"}</script> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= '//www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-KR697BF');</script> <!-- End Google Tag Manager --> <link rel="icon" href="https://cyberscoop.com/wp-content/uploads/sites/3/2023/01/cropped-cs_favicon-2.png?w=32" sizes="32x32" /> <link rel="icon" href="https://cyberscoop.com/wp-content/uploads/sites/3/2023/01/cropped-cs_favicon-2.png?w=192" sizes="192x192" /> <link rel="apple-touch-icon" href="https://cyberscoop.com/wp-content/uploads/sites/3/2023/01/cropped-cs_favicon-2.png?w=180" /> <meta name="msapplication-TileImage" content="https://cyberscoop.com/wp-content/uploads/sites/3/2023/01/cropped-cs_favicon-2.png?w=270" /> </head> <body class="post-template-default single single-post postid-80844 single-format-standard"> <a href="#main" class="skip-to-content-link visually-hidden-focusable">Skip to main content</a> <div class="auxiliary-nav js-site-auxiliary-nav"> <div class="auxiliary-nav__container"> <nav class="auxiliary-nav__nav"> <ul id="menu-auxiliary-manu" class="auxiliary-nav__menu"><li id="menu-item-70123" class="is-current-site menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-70123"><a href="https://cyberscoop.com/">CyberScoop</a></li> <li id="menu-item-70124" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70124"><a href="https://aiscoop.com/">AIScoop</a></li> <li id="menu-item-70119" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70119"><a href="https://www.fedscoop.com/">FedScoop</a></li> <li id="menu-item-70120" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70120"><a href="https://defensescoop.com/">DefenseScoop</a></li> <li id="menu-item-70121" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70121"><a href="https://statescoop.com/">StateScoop</a></li> <li id="menu-item-70122" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70122"><a href="https://edscoop.com/">EdScoop</a></li> </ul> </nav> <div class="auxiliary-nav__secondary"> <a href="https://scoopnewsgroup.com/oursolutions/" class="auxiliary-nav__promo"> Advertise </a> <button class="auxiliary-nav__search-toggle js-search-toggle" aria-controls="site-header-search" aria-expanded="false"> <span class="auxiliary-nav__search-toggle-open"> <svg class="icon icon--search" width="19" height="19" fill="none" viewBox="0 0 19 19" xmlns="http://www.w3.org/2000/svg"><path d="M7.9.7a6.805 6.805 0 0 0-6.8 6.8c0 3.752 3.048 6.8 6.8 6.8a6.757 6.757 0 0 0 3.975-1.288l5.262 5.25 1.125-1.125-5.2-5.212A6.77 6.77 0 0 0 14.7 7.5c0-3.752-3.048-6.8-6.8-6.8Zm0 .8c3.319 0 6 2.681 6 6s-2.681 6-6 6-6-2.681-6-6 2.681-6 6-6Z" fill="currentColor" stroke="currentColor" /></svg> <span class="auxiliary-nav__search-toggle-label">Search</span> </span> <span class="auxiliary-nav__search-toggle-close"> <svg class="icon icon--close" width="21" height="22" viewBox="0 0 21 22" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="m.822.518-.805.805L9.695 11 .017 20.678l.805.805 9.678-9.678 9.677 9.678.806-.805L11.305 11l9.678-9.677-.806-.805-9.677 9.677L.822.518Z" fill="currentColor" /></svg> <span class="auxiliary-nav__search-toggle-label">Close</span> </span> </button> </div> </div> <div class="auxiliary-nav__search" id="site-header-search" aria-hidden="true"> <div class="auxiliary-nav__search-wrap"> <div itemscope itemtype=http://schema.org/WebSite> <form role="search" id="searchform" class="site-search" method="get" action="https://cyberscoop.com/"> <meta itemprop="target" content="https://cyberscoop.com/?s={s}" /> <label class="screen-reader-text" for="search-field"> Search for: </label> <input class="site-search__input js-site-search-input" itemprop="query-input" type="text" id="search-field" value="" placeholder="Search news, people, podcasts, videos" name="s" /> <button class="site-search__button"> <svg class="icon icon--search" width="19" height="19" fill="none" viewBox="0 0 19 19" xmlns="http://www.w3.org/2000/svg"><path d="M7.9.7a6.805 6.805 0 0 0-6.8 6.8c0 3.752 3.048 6.8 6.8 6.8a6.757 6.757 0 0 0 3.975-1.288l5.262 5.25 1.125-1.125-5.2-5.212A6.77 6.77 0 0 0 14.7 7.5c0-3.752-3.048-6.8-6.8-6.8Zm0 .8c3.319 0 6 2.681 6 6s-2.681 6-6 6-6-2.681-6-6 2.681-6 6-6Z" fill="currentColor" stroke="currentColor" /></svg> <span class="visually-hidden">Search</span> </button> </form> </div> </div> </div> </div> <header class="site-header" aria-label="Scoop News Group Header" role="banner" > <div class="site-header__container"> <div class="site-header__logo-wrap" itemscope itemtype="https://schema.org/Organization"> <a itemprop="url" href="https://cyberscoop.com" class="site-header__logo-link"> <img class="site-header__logo site-header__logo--fed" itemprop="logo" src="https://cyberscoop.com/wp-content/themes/scoopnewsgroup/dist/svg/logo-cyber.svg" alt="CyberScoop" /> </a> </div> <button class="site-header__nav-toggle js-nav-toggle" aria-controls="site-header-nav-primary" aria-expanded="false"> <span class="site-header__nav-toggle-icon" aria-hidden="true"></span> <span class="screen-reader-text">Open navigation</span> </button> <nav id="site-header-nav-primary" class="site-header__nav" aria-hidden="true"> <ul id="menu-primary-nav" class="main-nav"> <li id="menu-item-70125" class="menu-item menu-item-70125 menu-item-has-children "> <a href="" aria-controls="nav-submenu-0" target="">Topics</a> <div id="nav-submenu-0" class="sub-menu js-nav-submenu "> <button class="sub-menu__back js-nav-submenu-back" aria-controls="nav-submenu-0"> <svg class="icon icon--caret" width="29" height="28" viewBox="0 0 29 28" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M3.212 9.468 2.04 10.64 14.5 23.1l12.46-12.46-1.172-1.172L14.5 20.755 3.212 9.468Z" fill="currentColor" /><path d="M3.352 5.04 2.18 6.213l12.46 12.46L27.1 6.212 25.927 5.04 14.64 16.327 3.352 5.04Z" fill="currentColor" /></svg> <span class="visually-hidden">Back</span> </button> <ul class="sub-menu__items"> <li id="menu-item-77950" class="menu-item menu-item-77950"> <a href="https://cyberscoop.com/news/ai/" target="" aria-controls="nav-submenu-77950">AI</a> </li> <li id="menu-item-70873" class="menu-item menu-item-70873"> <a href="https://cyberscoop.com/news/threats/cybercrime/" target="" aria-controls="nav-submenu-70873">Cybercrime</a> </li> <li id="menu-item-70875" class="menu-item menu-item-70875"> <a href="https://cyberscoop.com/news/commentary/" target="" aria-controls="nav-submenu-70875">Commentary</a> </li> <li id="menu-item-70876" class="menu-item menu-item-70876"> <a href="https://cyberscoop.com/news/financial/" target="" aria-controls="nav-submenu-70876">Financial</a> </li> <li id="menu-item-70877" class="menu-item menu-item-70877"> <a href="https://cyberscoop.com/news/government/" target="" aria-controls="nav-submenu-70877">Government</a> </li> <li id="menu-item-70134" class="menu-item menu-item-70134"> <a href="https://cyberscoop.com/news/policy/" target="" aria-controls="nav-submenu-70134">Policy</a> </li> <li id="menu-item-70135" class="menu-item menu-item-70135"> <a href="https://cyberscoop.com/news/privacy/" target="" aria-controls="nav-submenu-70135">Privacy</a> </li> <li id="menu-item-70136" class="menu-item menu-item-70136"> <a href="https://cyberscoop.com/news/technology/" target="" aria-controls="nav-submenu-70136">Technology</a> </li> <li id="menu-item-70137" class="menu-item menu-item-70137"> <a href="https://cyberscoop.com/news/threats/" target="" aria-controls="nav-submenu-70137">Threats</a> </li> <li id="menu-item-70874" class="menu-item menu-item-70874"> <a href="https://cyberscoop.com/news/research/" target="" aria-controls="nav-submenu-70874">Research</a> </li> <li id="menu-item-70138" class="menu-item menu-item-70138"> <a href="https://cyberscoop.com/news/workforce/" target="" aria-controls="nav-submenu-70138">Workforce</a> </li> </ul> </div> </li> <li id="menu-item-70174" class="menu-item menu-item-70174 mega-menu"> <a href="https://cyberscoop.com/specials/" aria-controls="nav-submenu-1" target="">Special Reports</a> </li> <li id="menu-item-70127" class="menu-item menu-item-70127 "> <a href="https://cyberscoop.com/attend" aria-controls="nav-submenu-2" target="">Events</a> </li> <li id="menu-item-70808" class="menu-item menu-item-70808 "> <a href="https://cyberscoop.com/listen/" aria-controls="nav-submenu-3" target="">Podcasts</a> </li> <li id="menu-item-70807" class="menu-item menu-item-70807 "> <a href="https://cyberscoop.com/watch/" aria-controls="nav-submenu-4" target="">Videos</a> </li> <li id="menu-item-70806" class="menu-item menu-item-70806 "> <a href="https://cyberscoop.com/insights/" aria-controls="nav-submenu-5" target="">Insights</a> </li> <li id="menu-item-82911" class="menu-item menu-item-82911 "> <a href="https://cyberscoop.com/cyberscoop50/" aria-controls="nav-submenu-6" target="">CyberScoop 50 Nominations</a> </li> </ul> <div class="site-header__auxiliary-nav"> <div class="site-header__auxiliary-label"> Switch Site </div> <ul id="site-header-aux-nav" class="site-header__auxiliary-menu js-site-header-aux-nav"><li class="is-current-site menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-70123"><a href="https://cyberscoop.com/">CyberScoop</a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70124"><a href="https://aiscoop.com/">AIScoop</a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70119"><a href="https://www.fedscoop.com/">FedScoop</a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70120"><a href="https://defensescoop.com/">DefenseScoop</a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70121"><a href="https://statescoop.com/">StateScoop</a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70122"><a href="https://edscoop.com/">EdScoop</a></li> </ul> </div> </nav> <a href="https://cyberscoop.com/subscribe/" class="site-header__subscribe"> <svg class="icon icon--newsletter" viewBox="0 0 29 22" width="29" height="22" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M.5.92v20.16h28V.92H.5Zm1.12 1.12h25.76v1.417L14.5 13.642 1.62 3.457V2.04Zm0 2.852 12.53 9.905a.56.56 0 0 0 .7 0l12.53-9.905V19.96H1.62V4.892Z" fill="currentColor" /></svg> Subscribe </a> </div> </header> <main id="main" role="main" tabindex="-1"> <section id="stickybar" class="stickybar stickybar--event js-stickybar"> <div class="stickybar__details"> <div class="stickybar__info js-sticky-bar-content"><p>Nominations can be submitted for the 2025 CyberScoop 50 awards!</p></div> <a class="stickybar__link button button-tertiary" href="https://cyberscoop.com/cyberscoop50/">Click here!</a> </div> <button class="stickybar__close js-stickybar-close" aria-controls="stickybar"> <svg class="icon icon--close" width="21" height="22" viewBox="0 0 21 22" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="m.822.518-.805.805L9.695 11 .017 20.678l.805.805 9.678-9.678 9.677 9.678.806-.805L11.305 11l9.678-9.677-.806-.805-9.677 9.677L.822.518Z" fill="currentColor" /></svg> <span class="visually-hidden">Close</span> </button> </section> <article class="single-article content"> <div class="single-article__container js-single-article-content"> <header class="single-article__header "> <div class="single-article__header-content"> <ul class="single-article__eyebrow"> <li class="single-article__sponsored"> <b>Sponsored</b> </li> <li class="single-article__category"> <a class="single-article__category-link" href=""> <span>AI</span> </a> </li> </ul> <h1 class="single-article__title"> Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training </h1> <div class="single-article__excerpt"> How generative AI provides one potential lever organizations can pull to scale human-led cyber defenses across the enterprise. </div> <div class="single-article__meta"> <p class="single-article__author"> <strong>By</strong> <span class="single-article__author-names"><a href="https://cyberscoop.com/author/jay-bhalodia/" class="" title="Jay Bhalodia" rel="author">Jay Bhalodia</a></span> </p> <p class="single-article__date"> <span> <time datetime="2024-06-28">June 28, 2024</time> </span> </p> </div> <!-- Listen to this article section --> <!-- End of audio player --> </div> <div class="single-article__cover-wrap"> <figure class="single-article__cover"> <img width="681" height="520" src="https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Screenshot-2024-07-23-at-10.01.14 AM.png?w=681" class="single-article__cover-image wp-post-image" alt="Photo illustration of AI and security." style="" decoding="async" fetchpriority="high" srcset="https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Screenshot-2024-07-23-at-10.01.14 AM.png 681w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Screenshot-2024-07-23-at-10.01.14 AM.png?resize=300,229 300w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Screenshot-2024-07-23-at-10.01.14 AM.png?resize=600,458 600w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Screenshot-2024-07-23-at-10.01.14 AM.png?resize=220,168 220w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Screenshot-2024-07-23-at-10.01.14 AM.png?resize=441,337 441w" sizes="(max-width: 681px) 100vw, 681px" /> </figure> </div> </header> <div class="single-article__content"> <div class="single-article__content-inner has-drop-cap"> <p>It’s safe to say that the cyber threat landscape has never been more complex than it is today. Security teams are dealing with a near-constant barrage of attacks that are only continuing to increase in both frequency and sophistication. According to the <a href="https://www.microsoft.com/en-us/security/security-insider/microsoft-digital-defense-report-2023">Microsoft Digital Defense Report 2023</a>, attempted password attacks increased more than tenfold last year — jumping from 3 billion attempts per month to more than 30 billion.</p> <p>This flood of security alerts and incidents makes it difficult to effectively drive organization-wide security. For starters, many organizations lack the number of cyber defenders they need to respond to alerts. ISC2 estimates that the gap between the number of security professionals needed and qualified personnel available grew <a href="https://www.nextgov.com/cybersecurity/2023/10/cyber-workforce-gap-growing/391618/">13%</a> from 2022 to 2023 — translating to an estimated 4 million new workers required to meet current demands.</p> <figure class="wp-block-image alignleft size-large is-resized"><img decoding="async" width="446" height="443" src="https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Thumbnail_Microsoft-1-e1721743758908.png?w=446" alt="" class="wp-image-80875" style="width:242px;height:auto" srcset="https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Thumbnail_Microsoft-1-e1721743758908.png 446w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Thumbnail_Microsoft-1-e1721743758908.png?resize=150,150 150w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Thumbnail_Microsoft-1-e1721743758908.png?resize=300,298 300w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Thumbnail_Microsoft-1-e1721743758908.png?resize=169,168 169w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Thumbnail_Microsoft-1-e1721743758908.png?resize=339,337 339w" sizes="(max-width: 446px) 100vw, 446px" /><figcaption class="wp-element-caption"><br>Jay Bhalodia is the managing director and founder of Microsoft Federal’s Security, Compliance, and Identity (SCI) Customer Success organization.</figcaption></figure> <p>Additionally, we also must consider the impact that a single employee’s actions can have on the entire organization’s security posture. Human error, whether unintentional or a deliberate insider action, is one of the leading causes of cyber breaches and plays a role in <a href="https://www.verizon.com/business/resources/reports/dbir/">76%</a> of incidents. If already overburdened security teams are to properly protect their organization’s digital estate, then employees at all levels must do their part by consistently following security best practices to reduce the risk of a breach.</p> <p>When combined with a holistic security awareness and education program, generative AI is one potential lever organizations can pull to scale human-led cyber defenses across the enterprise. Here’s how.</p> <p><strong>Scale security knowledge and best practices with AI</strong></p> <p>Generative AI holds enormous potential in the security space, able to scale institutional knowledge and security best practices for less experienced defenders by prompting them with automated remediation steps and guidance.</p> <p>With generative AI, they don’t need to focus as much on teaching a specific remediation technique or providing instructions for how to use a particular technology. Instead, the focus is on teaching cyber defenders what AI workflow or prompt they should call on for which scenarios. This model allows security practitioners to automate repetitive and time-consuming tasks, saving their brainpower for more strategic scenarios that require creative problem-solving or a novel approach. Generative AI isn’t taking anyone’s job. Rather, it’s simply offloading the security problems that we already know how to solve.</p> <p>At Microsoft, we use <a href="https://learn.microsoft.com/en-us/copilot/security/microsoft-security-copilot">Copilot for Security</a> to help increase defender efficiency and capabilities to improve security outcomes at machine speed and scale. Because Copilot for Security uses natural language processing (NLP) to support cyber defenders in end-to-end scenarios like incident response, threat hunting, intelligence gathering, and posture management, it’s easier for less-experienced security practitioners to achieve more and take on unfamiliar security tasks.</p> <p>This knowledge-scaling capability also has the dual benefit of lowering the time and barrier to entry for new cyber defenders. AI can level the playing field for cyber defenders’ understanding of specific attack types, remediation techniques, security platforms, and more. This AI-enabled shift reduces time-intensive hiring requirements—such as experience and academic study—and fosters <a href="https://www.whitehouse.gov/oncd/briefing-room/2024/04/29/press-release-wh-cyber-workforce-convening/#:~:text=More%20than%20500%2C000%20cybersecurity%20positions">skill-based hiring</a> for entry and mid-level roles. This skill-based approach addresses both the cybersecurity skill gap and the headcount gap, and empowers human resource and cybersecurity managers who report valuing certification-based training over traditional degree-based education for mid-level roles by a <a href="https://www.sans.org/mlp/2024-attract-hire-retain-midlevel-cybersecurity-roles/">2:1 ratio</a>.<br><br>Reducing the barrier to entry also opens the security profession to more candidates, enabling our industry to promote diversity of thought and background which is crucial to countering the increasing sophistication and creativity of attacks. According to the 2024 SANS GIAC Cyber Workforce Research Report, 71% of respondents are committed to prioritizing the recruitment of diverse candidates within their cybersecurity workforce. Today, <a href="https://www.isc2.org/Insights/2023/12/ISC2-Cybersecurity-Workforce-Study-Looking-Deeper-into-Workforce-Culture-and-DEI">69%</a> of cybersecurity professionals believe an inclusive environment is essential for their team to succeed, while 53% report that diversity within the security team has contributed to its success.</p> <p><strong>Equip employees at all levels to become cyber defenders</strong></p> <p>In addition to using generative AI to increase cyber defenders’ effectiveness and scale their impact, organizations must also work to proactively reduce their human attack surface through <a href="https://www.microsoft.com/en-us/security/business/cybersecurity-awareness#x92dfe08fb83f42589c6932d9ad0196ef">security awareness and education programs</a>. There are four key pillars organizations should focus on when structuring these trainings:</p> <p><strong>1. Identify your most pressing organizational risks: </strong>In the past, security training has often been positioned as a compliance requirement that organizations must complete to “check a box.” However, this one-size-fits-all approach misses the mark on equipping employees with the tools they need to change specific risky behaviors.</p> <p>At its core, security awareness training is simply a security control that addresses human risk within your organization. When building a training program, start by identifying the human risk. Examine previous cybersecurity incidents across your organization. What was the cause of each incident and how did it unfold? From there, you can begin to extrapolate which specific risks you need to address with employees and create a plan for preventing similar incidents from occurring in the future. Industry research and <a href="https://www.microsoft.com/en-us/security/security-insider/microsoft-digital-defense-report-2023">comprehensive security reports</a> are other resources to use when evaluating which risks to include in your training program.</p> <p><strong>2. Establish metrics to quantify risks and measure progress:</strong> Once you have identified your organization’s specific risks, it’s time to quantify them and create a plan for measuring employee progress.</p> <p>Start by looking at risk or impact to quantify why the behavioral change is important. What was the cost of each incident to your organization? Did your organization or customers experience downtime while the threat was remediated? Was sensitive customer data leaked? To properly incentivize behavioral change, you have to start by identifying and communicating the “why.”</p> <p>Next, quantify the desired behavior change in a measurable way that will allow you to track employee progress. For example, say your organization realized risk with employees frequently downloading email attachments from unknown contacts. By training people about the risk of downloading attachments from unknown contacts and measuring the number of attachments downloaded from external contacts pre- and post-training, you can measure the program’s impact.</p> <p>Measuring progress is one way to hold employees accountable and confirm whether the education provided was effective at changing behavior or if a different approach is needed.</p> <p><strong>3.</strong> <strong>Incentivize behavioral change:</strong> The core reason why organizations conduct regular security awareness training is to drive behavioral change. Not only must employees complete the training, but they should also continue to follow its teachings long after the education module is completed. Otherwise, your training program didn’t reduce your risk posture.</p> <p>Measurement is one way to track behavioral change, but incentives are an effective way to encourage employees to continually adhere to security best practices. Get creative with your incentives; it’s ok to make security fun! Create internal challenges to see which division can score the highest, or distribute digital badges to employees who complete their training within the first 30 days. Encouraging behavior doesn’t need to be anything costly or overly time-intensive. They should simply act as a vehicle for recognizing and reinforcing the desired employee behavior, thus getting you closer to your intended result of sustained behavioral change.</p> <p><strong>4. Create a self-sustaining culture of security:</strong> Perhaps the most challenging and most important pillar of all is to create a broader culture of security awareness within your organization. For this to work, organizations and leaders must continually reinforce security teachings to ensure the knowledge remains top of mind.</p> <p>This is primarily a marketing and branding problem. Focus on creating an internal message that communicates why security awareness training is crucial for all employees, not just the security team, and the impact a single employee’s actions can have on the integrity of your organization as a whole. Then, identify spokespeople at various levels of the org chart who can champion this messaging and encourage their peers to take a more active role in cybersecurity—thus embedding security more deeply into your organization. The end goal is for employees to understand the core concepts of good security practices versus unsafe ones, and to have the necessary skills to proactively apply that understanding to other types of security risks they may witness.</p> <p>When used in concert, generative AI-enabled security solutions and broad-reaching security and awareness training can supercharge the effectiveness of your defenders.</p> <p>Security awareness and education programs reduce human risk factors by embedding security best practices at all levels of the organization and ensuring employees understand the “why” behind specific positive security behaviors. This is crucial given that more than three-quarters of security incidents involve unintentional human error or insider risk. Meanwhile, organizations can enable existing security practitioners by leveraging generative AI to increase defenders’ knowledge base and drive faster times to threat detection and resolution.</p> <p><em>Learn more about advancing federal threat protection and cybersecurity best practices at <strong> </strong><a href="https://aka.ms/FedCyber">https://aka.ms/FedCyber</a>.</em></p> <footer class="single-article__footer"> <div class="author-card"> <div class="author-card__avatar"> <figure class="author-card__image-wrap"> <img class="author-card__image" src="https://cyberscoop.com/wp-content/uploads/sites/3/2024/06/Jay-Bhalodia.png?w=150&h=150&crop=1" alt="Jay Bhalodia"> </figure> </div> <div class="author-card__details"> <h4 class="author-card__name">Written by Jay Bhalodia</h4> Jay Bhalodia is the Managing Director and founder of Microsoft Federal's Security, Compliance, and Identity (SCI) Customer Success organization. The Microsoft Federal SCI Customer Success Organization accelerates federal government transformation through security solutions that enable mission outcomes and cloud to enable cybersecurity outcomes. In this role, Jay leads Microsoft Federal's Solution Architects and Engineers that provide advisory and cybersecurity operations support to empower Federal customers and their partners. </div> </div> </footer> </div> <div class="single-article__share"> <div class="social-share social-share--"> <div class="social-share__content"> <div class="social-share__title">Share</div> <ul class="social-share__items"> <li class="social-share__item"> <a href="https://www.facebook.com/sharer/sharer.php?u=https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/" target="_blank" class="social-share__link"> <svg class="icon icon--facebook" viewBox="0 0 29 28" width="29" height="28" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M25 3.5H4v21h11.225v-8.121H12.49v-3.18h2.734v-2.338c0-2.712 1.657-4.19 4.077-4.19.816-.002 1.63.04 2.44.122V9.63h-1.665c-1.319 0-1.575.623-1.575 1.542v2.024h3.15l-.41 3.18h-2.759V24.5H25v-21Z" fill="currentColor" /></svg> <span class="social-share__label">Facebook</span> </a> </li> <li class="social-share__item"> <a href="https://www.linkedin.com/cws/share?url=https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/" target="_blank" class="social-share__link"> <svg class="icon icon--linkedin" viewBox="0 0 29 28" width="29" height="28" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M25 3.5H4v21h21v-21ZM11 19.833H8.056v-8.166H11v8.166ZM9.476 10.17c-.9 0-1.5-.6-1.5-1.4 0-.8.6-1.4 1.6-1.4.899 0 1.5.6 1.5 1.4 0 .8-.6 1.4-1.6 1.4ZM21.5 19.833h-2.849V15.37c0-1.235-.76-1.52-1.044-1.52-.285 0-1.235.19-1.235 1.52v4.463H13.43v-8.166h2.943v1.14c.38-.665 1.14-1.14 2.564-1.14 1.424 0 2.564 1.14 2.564 3.703v4.463Z" fill="currentColor" /></svg> <span class="social-share__label">LinkedIn</span> </a> </li> <li class="social-share__item"> <a href="https://twitter.com/intent/tweet?url=https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/" target="_blank" class="social-share__link"> <svg class="icon icon--twitter" viewBox="0 0 29 28" width="29" height="28" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M25,3.5H4v21h21V3.5Z" fill="currentColor" /> <path d="M15.6,13.1l4.2-4.9h-1l-3.6,4.2-2.9-4.2h-3.4l4.4,6.4-4.4,5.1h1l3.8-4.5,3.1,4.5h3.4l-4.6-6.6h0ZM14.2,14.7l-.4-.6-3.5-5.1h1.5l2.9,4.1.4.6,3.7,5.3h-1.5l-3-4.3h-.1Z" fill="white" /> </svg> <span class="social-share__label">Twitter</span> </a> </li> <li class="social-share__item"> <button class="social-share__link js-social-share-copy js-copy-to-clipboard" data-link="https://cyberscoop.com/want-to-scale-cyber-defenders-focus-on-ai-enabled-security-and-organization-wide-training/"> <svg class="icon icon--instagram" viewBox="0 0 27 27" width="27" height="27" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M3.886 4.013h19.27v19.269H3.885V4.012ZM15.244 8.03a2.746 2.746 0 0 1 1.948-.806c.705 0 1.41.27 1.946.806a2.756 2.756 0 0 1 0 3.893l-1.53 1.53a2.745 2.745 0 0 1-2.823.66l1.1-1.1c.314-.046.617-.184.858-.425l1.53-1.53a1.532 1.532 0 0 0-1.081-2.61c-.392 0-.784.149-1.082.447l-1.53 1.53c-.242.241-.38.544-.426.858l-1.099 1.1c-.32-.96-.103-2.061.66-2.824l1.53-1.53Zm-.32 3.35a.612.612 0 1 1 .865.865l-3.671 3.67a.612.612 0 1 1-.866-.864l3.671-3.672Zm-5.492 2.462a2.74 2.74 0 0 1 2.084-.8c.25.014.5.06.739.14l-1.099 1.099a1.517 1.517 0 0 0-.859.427l-1.53 1.53a1.531 1.531 0 0 0 0 2.162 1.53 1.53 0 0 0 2.164 0l1.53-1.53c.24-.24.38-.544.425-.858l1.1-1.1c.32.96.102 2.06-.66 2.823l-1.53 1.53a2.745 2.745 0 0 1-1.947.805c-.705 0-1.41-.268-1.946-.805a2.757 2.757 0 0 1 0-3.894l1.53-1.53Z" fill="currentColor" /></svg> <span class="social-share__label js-social-share-label">Copy Link</span> </button> </li> </ul> </div> </div> </div> </div> </div> <div class="single-article__ads js-single-article-sidebar"> <div class="sidebar js-single-article-sidebar-2"> <h2 class="sidebar__title">More Like This</h2> <ol class="sidebar__items"> <li class="sidebar__item"> <article class="post-item post-item--feed "> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/ai-safety-jd-vance-paris-ai-summit-deregulation/"> In Paris, U.S. signals shift from AI safety to deregulation </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/derek-johnson/"> Derek B. Johnson </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> </li> <li class="sidebar__item"> <article class="post-item post-item--feed "> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/hugging-face-platform-continues-to-be-plagued-by-vulnerable-pickles/"> Hugging Face platform continues to be plagued by vulnerable ‘pickles’ </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/derek-johnson/"> Derek B. Johnson </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> </li> </ol> </div> <div class="sidebar sidebar--numbered js-single-article-sidebar-1"> <h2 class="sidebar__title">Top Stories</h2> <ol class="sidebar__items"> <li class="sidebar__item"> <article class="post-item post-item--feed "> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/salt-typhoon-telecom-breach-remarkable-for-its-indiscriminate-targeting-fbi-official-says/"> Salt Typhoon telecom breach remarkable for its ‘indiscriminate’ targeting, FBI official says </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/tim-starkscyberscoop-com/"> Tim Starks </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> </li> <li class="sidebar__item"> <article class="post-item post-item--feed "> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/sec-cyber-unit-cryptocurrency-enforcement-emerging-technologies/"> SEC rebrands cryptocurrency unit to focus on emerging technologies </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/derek-johnson/"> Derek B. Johnson </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> </li> <li class="sidebar__item"> <article class="post-item post-item--feed "> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/cisco-talos-salt-typhoon-initial-access/"> Salt Typhoon gained initial access to telecoms through Cisco devices </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/matt-kapko/"> Matt Kapko </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> </li> </ol> </div> <div class="single-article__sticky-ads"> </div> </div> </article> <div class="popular-stories popular-stories--single-post"> <div class="popular-stories__container"> <h2 class="popular-stories__title"> More Scoops </h2> <div class="popular-stories__stories"> <div class="popular-stories__cards"> <article class="post-item post-item--popular-stories-cards "> <figure class="post-item__thumbnail"> <a class="post-item__thumbnail-link" href="https://cyberscoop.com/java-applications-security-op-ed/" tabindex="-1"> <img width="456" height="337" src="https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg?w=456" class="attachment-ratio-16-9-md size-ratio-16-9-md wp-post-image" alt="" style="" decoding="async" loading="lazy" srcset="https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg 2015w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg?resize=300,222 300w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg?resize=768,567 768w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg?resize=1024,756 1024w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg?resize=1536,1134 1536w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg?resize=600,443 600w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg?resize=228,168 228w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg?resize=456,337 456w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg?resize=914,675 914w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/GettyImages-1148960878.jpg?resize=1142,843 1142w" sizes="auto, (max-width: 456px) 100vw, 456px" /> </a> <figcaption class="screen-reader-text"> (Getty Images) </figcaption> </figure> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/java-applications-security-op-ed/"> Java security: If you ain’t cheatin,’ you ain’t tryin’ </a> </h3> <div class="post-item__excerpt"> Rigging the odds in your favor is the only way security practitioners can go. </div> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/doug-ennis/"> Doug Ennis </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> <article class="post-item post-item--popular-stories-cards "> <figure class="post-item__thumbnail"> <a class="post-item__thumbnail-link" href="https://cyberscoop.com/darpa-redc-bus-cybersecurity-firmware/" tabindex="-1"> <img width="300" height="168" src="https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/GettyImages-1307633136.jpg?w=300" class="attachment-ratio-16-9-sm size-ratio-16-9-sm wp-post-image" alt="" style="" decoding="async" loading="lazy" srcset="https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/GettyImages-1307633136.jpg 3840w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/GettyImages-1307633136.jpg?resize=300,168 300w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/GettyImages-1307633136.jpg?resize=768,432 768w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/GettyImages-1307633136.jpg?resize=1024,576 1024w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/GettyImages-1307633136.jpg?resize=1536,864 1536w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/GettyImages-1307633136.jpg?resize=2048,1152 2048w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/GettyImages-1307633136.jpg?resize=600,337 600w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/GettyImages-1307633136.jpg?resize=1200,675 1200w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/GettyImages-1307633136.jpg?resize=1500,843 1500w" sizes="auto, (max-width: 300px) 100vw, 300px" /> </a> <figcaption class="screen-reader-text"> DARPA’s work focuses on two specific types of buses: Peripheral Component Interconnect Express (PCIe) and Compute Express Link (CXL). (Photo by Getty Images) </figcaption> </figure> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/darpa-redc-bus-cybersecurity-firmware/"> DARPA wants to create ‘self-healing’ firmware that can respond and recover from cyberattacks </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/derek-johnson/"> Derek B. Johnson </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> <article class="post-item post-item--popular-stories-cards "> <figure class="post-item__thumbnail"> <a class="post-item__thumbnail-link" href="https://cyberscoop.com/lightningai-vulnerability-noma-cloud-phishing/" tabindex="-1"> <img width="262" height="168" src="https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?w=262" class="attachment-ratio-16-9-sm size-ratio-16-9-sm wp-post-image" alt="" style="" decoding="async" loading="lazy" srcset="https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg 5133w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?resize=300,192 300w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?resize=768,492 768w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?resize=1024,656 1024w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?resize=1536,984 1536w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?resize=2048,1312 2048w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?resize=600,384 600w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?resize=262,168 262w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?resize=526,337 526w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?resize=1054,675 1054w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/01/lightning.jpg?resize=1316,843 1316w" sizes="auto, (max-width: 262px) 100vw, 262px" /> </a> <figcaption class="screen-reader-text"> A flaw in Lightning.AI’s platform, which has been patched, would have given root access to an attacker and broad control over a victim’s cloud-based studio and connected systems. (Image Source: Getty Images) </figcaption> </figure> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/lightningai-vulnerability-noma-cloud-phishing/"> Vulnerability in popular AI developer could ‘shut down essentially everything you own’ </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/derek-johnson/"> Derek B. Johnson </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> </div> <div class="popular-stories__headlines"> <article class="post-item post-item--popular-stories-headlines "> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/doj-indicts-five-in-north-korean-fake-it-worker-scheme/"> DOJ indicts five in North Korean fake IT worker scheme </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/matt-bracken/"> Matt Bracken </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> <article class="post-item post-item--popular-stories-headlines "> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/ransomware-groups-pose-as-fake-tech-support-over-teams/"> Ransomware groups pose as fake tech support over Teams </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/derek-johnson/"> Derek B. Johnson </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> <article class="post-item post-item--popular-stories-headlines "> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/from-qualitative-to-quantifiable-transforming-cyber-risk-management-for-critical-infrastructure/"> From qualitative to quantifiable: Transforming cyber risk management for critical infrastructure </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/richard-caralli/"> Richard Caralli </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> <article class="post-item post-item--popular-stories-headlines "> <header class="post-item__meta"> <h3 class="post-item__title"> <a class="post-item__title-link" href="https://cyberscoop.com/hhs-cybersecurity-health-care-systems-hospitals/"> How HHS has strengthened cybersecurity of hospitals and health care systems </a> </h3> <div class="post-item__byline"> <span class="post-item__author"> <span>By </span> <a class="post-item__author-link" href="https://cyberscoop.com/author/andrea-palm/"> Andrea Palm </a> </span> </div><!-- .byline --> </header><!-- .post-item__meta --> </article> </div> </div><!-- .popular-stories__stories --> </div><!-- .popular-stories__inner --> </div><!-- .popular-stories --> <section class="latest-podcasts"> <h2 class="latest-podcasts__title"> Latest Podcasts </h2> <div class="latest-podcasts__feed"> <div class="podcast-card "> <div class="podcast-card__thumb"> <div class="podcast-card__image-wrap"> <img width="300" height="164" src="https://cyberscoop.com/wp-content/uploads/sites/3/2024/12/SafeMode-Guest_thumbnail.png?w=300" class="podcast-card__image wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://cyberscoop.com/wp-content/uploads/sites/3/2024/12/SafeMode-Guest_thumbnail.png 864w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/12/SafeMode-Guest_thumbnail.png?resize=300,164 300w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/12/SafeMode-Guest_thumbnail.png?resize=768,420 768w, https://cyberscoop.com/wp-content/uploads/sites/3/2024/12/SafeMode-Guest_thumbnail.png?resize=600,328 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /> </div> </div> <h4 class="podcast-card__title"> <a class="podcast-card__link" href="https://cyberscoop.com/radio/greg-otto-talks-with-emily-crose-about-her-new-book-hack-to-the-future-how-world-governments-relentlessly-pursue-and-domesticate-hackers/"> <svg class="icon icon--podcast" viewBox="0 0 27 27" xmlns="http://www.w3.org/2000/svg" width="27" height="27" fill="none"><path fill="currentColor" d="M13.666.72c-3.115 0-5.668 2.469-5.668 5.524v6.455c0 3.055 2.553 5.524 5.668 5.524s5.668-2.47 5.668-5.524V6.244c0-3.055-2.553-5.524-5.668-5.524Zm0 1.06c2.561 0 4.609 1.995 4.609 4.464v.144h-2.859a.515.515 0 0 0 .048 1.028h2.81v1.027h-2.858a.515.515 0 0 0 .048 1.028h2.81V10.5h-2.858a.515.515 0 0 0 .048 1.027h2.81V12.7c0 2.469-2.047 4.464-4.608 4.464-2.561 0-4.608-1.995-4.608-4.464v-1.172h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81V9.47h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81V7.416h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81v-.144c0-2.47 2.047-4.464 4.608-4.464ZM5.862 9.535a.447.447 0 0 0-.353.45v2.57c0 3.957 2.85 7.28 6.6 8.012v3.292h-3.34c-.978 0-1.783.807-1.783 1.782v.755h13.296v-.755c0-.975-.805-1.782-1.783-1.782h-3.275v-3.292c3.75-.733 6.6-4.055 6.6-8.013v-2.57a.449.449 0 1 0-.9 0v2.57a7.258 7.258 0 0 1-14.516 0v-2.57a.448.448 0 0 0-.498-.449h-.048Zm7.306 11.144c.165.01.332.032.498.032.167 0 .333-.022.498-.032v3.164h-.996v-3.164Zm-4.4 4.207h3.742c.042.01.084.016.128.016h2.056a.526.526 0 0 0 .112-.016H18.5c.33 0 .548.217.659.498H8.11c.11-.28.327-.498.659-.498Z" /></svg> Emily Crose on the government’s long history with hackers </a> </h4> </div> <div class="podcast-card "> <div class="podcast-card__thumb"> <div class="podcast-card__image-wrap"> <img width="300" height="164" src="https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail-15.png?w=300" class="podcast-card__image wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail-15.png 864w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail-15.png?resize=300,164 300w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail-15.png?resize=768,420 768w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail-15.png?resize=600,328 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /> </div> </div> <h4 class="podcast-card__title"> <a class="podcast-card__link" href="https://cyberscoop.com/radio/cynthia-kaiser-deputy-assistant-director-in-the-bureaus-cyber-division-talk-about-the-implications-of-the-salt-typhoon-breach-which-she-spoke-about-during-cyberscoops-zero-trust-s/"> <svg class="icon icon--podcast" viewBox="0 0 27 27" xmlns="http://www.w3.org/2000/svg" width="27" height="27" fill="none"><path fill="currentColor" d="M13.666.72c-3.115 0-5.668 2.469-5.668 5.524v6.455c0 3.055 2.553 5.524 5.668 5.524s5.668-2.47 5.668-5.524V6.244c0-3.055-2.553-5.524-5.668-5.524Zm0 1.06c2.561 0 4.609 1.995 4.609 4.464v.144h-2.859a.515.515 0 0 0 .048 1.028h2.81v1.027h-2.858a.515.515 0 0 0 .048 1.028h2.81V10.5h-2.858a.515.515 0 0 0 .048 1.027h2.81V12.7c0 2.469-2.047 4.464-4.608 4.464-2.561 0-4.608-1.995-4.608-4.464v-1.172h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81V9.47h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81V7.416h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81v-.144c0-2.47 2.047-4.464 4.608-4.464ZM5.862 9.535a.447.447 0 0 0-.353.45v2.57c0 3.957 2.85 7.28 6.6 8.012v3.292h-3.34c-.978 0-1.783.807-1.783 1.782v.755h13.296v-.755c0-.975-.805-1.782-1.783-1.782h-3.275v-3.292c3.75-.733 6.6-4.055 6.6-8.013v-2.57a.449.449 0 1 0-.9 0v2.57a7.258 7.258 0 0 1-14.516 0v-2.57a.448.448 0 0 0-.498-.449h-.048Zm7.306 11.144c.165.01.332.032.498.032.167 0 .333-.022.498-.032v3.164h-.996v-3.164Zm-4.4 4.207h3.742c.042.01.084.016.128.016h2.056a.526.526 0 0 0 .112-.016H18.5c.33 0 .548.217.659.498H8.11c.11-.28.327-.498.659-.498Z" /></svg> FBI’s Cynthia Kaiser on Salt Typhoon’s ‘indiscriminate’ data collection </a> </h4> </div> <div class="podcast-card "> <div class="podcast-card__thumb"> <div class="podcast-card__image-wrap"> <img width="300" height="164" src="https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail-13.png?w=300" class="podcast-card__image wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail-13.png 864w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail-13.png?resize=300,164 300w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail-13.png?resize=768,420 768w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail-13.png?resize=600,328 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /> </div> </div> <h4 class="podcast-card__title"> <a class="podcast-card__link" href="https://cyberscoop.com/radio/greg-otto-talks-with-jackie-burns-koven-head-of-cyber-threat-intelligence-at-chainalysis/"> <svg class="icon icon--podcast" viewBox="0 0 27 27" xmlns="http://www.w3.org/2000/svg" width="27" height="27" fill="none"><path fill="currentColor" d="M13.666.72c-3.115 0-5.668 2.469-5.668 5.524v6.455c0 3.055 2.553 5.524 5.668 5.524s5.668-2.47 5.668-5.524V6.244c0-3.055-2.553-5.524-5.668-5.524Zm0 1.06c2.561 0 4.609 1.995 4.609 4.464v.144h-2.859a.515.515 0 0 0 .048 1.028h2.81v1.027h-2.858a.515.515 0 0 0 .048 1.028h2.81V10.5h-2.858a.515.515 0 0 0 .048 1.027h2.81V12.7c0 2.469-2.047 4.464-4.608 4.464-2.561 0-4.608-1.995-4.608-4.464v-1.172h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81V9.47h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81V7.416h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81v-.144c0-2.47 2.047-4.464 4.608-4.464ZM5.862 9.535a.447.447 0 0 0-.353.45v2.57c0 3.957 2.85 7.28 6.6 8.012v3.292h-3.34c-.978 0-1.783.807-1.783 1.782v.755h13.296v-.755c0-.975-.805-1.782-1.783-1.782h-3.275v-3.292c3.75-.733 6.6-4.055 6.6-8.013v-2.57a.449.449 0 1 0-.9 0v2.57a7.258 7.258 0 0 1-14.516 0v-2.57a.448.448 0 0 0-.498-.449h-.048Zm7.306 11.144c.165.01.332.032.498.032.167 0 .333-.022.498-.032v3.164h-.996v-3.164Zm-4.4 4.207h3.742c.042.01.084.016.128.016h2.056a.526.526 0 0 0 .112-.016H18.5c.33 0 .548.217.659.498H8.11c.11-.28.327-.498.659-.498Z" /></svg> Chainalysis’ Jackie Burns-Koven on the drop in ransomware payments </a> </h4> </div> <div class="podcast-card "> <div class="podcast-card__thumb"> <div class="podcast-card__image-wrap"> <img width="300" height="164" src="https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail.png?w=300" class="podcast-card__image wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail.png 864w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail.png?resize=300,164 300w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail.png?resize=768,420 768w, https://cyberscoop.com/wp-content/uploads/sites/3/2025/02/SafeMode-Guest_thumbnail.png?resize=600,328 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /> </div> </div> <h4 class="podcast-card__title"> <a class="podcast-card__link" href="https://cyberscoop.com/radio/greg-otto-talks-with-john-hultquist-chief-analyst-for-google-threat-intelligence-group-they-explore-the-qualitative-differences-between-ai-generated-and-human-crafted-social-engineering-tactics-an/"> <svg class="icon icon--podcast" viewBox="0 0 27 27" xmlns="http://www.w3.org/2000/svg" width="27" height="27" fill="none"><path fill="currentColor" d="M13.666.72c-3.115 0-5.668 2.469-5.668 5.524v6.455c0 3.055 2.553 5.524 5.668 5.524s5.668-2.47 5.668-5.524V6.244c0-3.055-2.553-5.524-5.668-5.524Zm0 1.06c2.561 0 4.609 1.995 4.609 4.464v.144h-2.859a.515.515 0 0 0 .048 1.028h2.81v1.027h-2.858a.515.515 0 0 0 .048 1.028h2.81V10.5h-2.858a.515.515 0 0 0 .048 1.027h2.81V12.7c0 2.469-2.047 4.464-4.608 4.464-2.561 0-4.608-1.995-4.608-4.464v-1.172h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81V9.47h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81V7.416h2.81a.517.517 0 0 0 .451-.255.519.519 0 0 0 0-.518.517.517 0 0 0-.451-.255h-2.81v-.144c0-2.47 2.047-4.464 4.608-4.464ZM5.862 9.535a.447.447 0 0 0-.353.45v2.57c0 3.957 2.85 7.28 6.6 8.012v3.292h-3.34c-.978 0-1.783.807-1.783 1.782v.755h13.296v-.755c0-.975-.805-1.782-1.783-1.782h-3.275v-3.292c3.75-.733 6.6-4.055 6.6-8.013v-2.57a.449.449 0 1 0-.9 0v2.57a7.258 7.258 0 0 1-14.516 0v-2.57a.448.448 0 0 0-.498-.449h-.048Zm7.306 11.144c.165.01.332.032.498.032.167 0 .333-.022.498-.032v3.164h-.996v-3.164Zm-4.4 4.207h3.742c.042.01.084.016.128.016h2.056a.526.526 0 0 0 .112-.016H18.5c.33 0 .548.217.659.498H8.11c.11-.28.327-.498.659-.498Z" /></svg> Google’s John Hultquist on how APTs are using generative AI </a> </h4> </div> </div> </section> <div class="top-categories"> <div class="top-categories__container"> <h3 class="top-categories__category-title">Government</h3> <ul class="top-categories__stories"> <li class="top-categories__story" data-match-height="story0"><a class="top-categories__link" href="https://cyberscoop.com/zero-trust-federal-government-vendors-interoperable/"><div class="top-categories__story-title">Energy CISO: Agencies can’t implement zero trust alone</div></a></li><li class="top-categories__story" data-match-height="story1"><a class="top-categories__link" href="https://cyberscoop.com/sean-cairncross-national-cyber-director-nomination-donald-trump/"><div class="top-categories__story-title">Trump picks Sean Cairncross for national cyber director</div></a></li><li class="top-categories__story" data-match-height="story2"><a class="top-categories__link" href="https://cyberscoop.com/cisa-misinformation-disinformation-administrative-leave/"><div class="top-categories__story-title">CISA election, disinformation officials placed on administrative leave, sources say</div></a></li><li class="top-categories__story" data-match-height="story3"><a class="top-categories__link" href="https://cyberscoop.com/doj-disbands-foreign-influence-task-force/"><div class="top-categories__story-title">DOJ disbands foreign influence task force, limits scope of FARA prosecutions </div></a></li> </ul> </div> <div class="top-categories__container"> <h3 class="top-categories__category-title">Technology</h3> <ul class="top-categories__stories"> <li class="top-categories__story" data-match-height="story0"><a class="top-categories__link" href="https://cyberscoop.com/cyberark-zilla-security-acquisition/"><div class="top-categories__story-title">CyberArk acquires Zilla Security in $175 million deal </div></a></li><li class="top-categories__story" data-match-height="story1"><a class="top-categories__link" href="https://cyberscoop.com/whatsapp-says-it-disrupted-spyware-campaign-aimed-at-reporters-civil-society/"><div class="top-categories__story-title">WhatsApp says it disrupted spyware campaign aimed at reporters, civil society</div></a></li><li class="top-categories__story" data-match-height="story2"><a class="top-categories__link" href="https://cyberscoop.com/deepseek-website-malicious-attack-ai-china/"><div class="top-categories__story-title">DeepSeek AI claims services are facing 'large-scale malicious attacks' </div></a></li><li class="top-categories__story" data-match-height="story3"><a class="top-categories__link" href="https://cyberscoop.com/opengrep-static-analysis-security-tool-semgrep-open-source/"><div class="top-categories__story-title">Open-source security spat leads companies to join forces for new tool</div></a></li> </ul> </div> <div class="top-categories__container"> <h3 class="top-categories__category-title">Threats</h3> <ul class="top-categories__stories"> <li class="top-categories__story" data-match-height="story0"><a class="top-categories__link" href="https://cyberscoop.com/russia-threat-groups-target-ukraine-signal/"><div class="top-categories__story-title">Russia-aligned threat groups dupe Ukrainian targets via Signal</div></a></li><li class="top-categories__story" data-match-height="story1"><a class="top-categories__link" href="https://cyberscoop.com/edge-device-vulnerabilities-fuel-attack-sprees/"><div class="top-categories__story-title">Edge device vulnerabilities fueled attack sprees in 2024</div></a></li><li class="top-categories__story" data-match-height="story2"><a class="top-categories__link" href="https://cyberscoop.com/russia-threat-groups-device-code-phishing-microsoft-accounts/"><div class="top-categories__story-title">Threat researchers spot ‘device code’ phishing attacks targeting Microsoft accounts</div></a></li><li class="top-categories__story" data-match-height="story3"><a class="top-categories__link" href="https://cyberscoop.com/salt-typhoon-china-ongoing-telecom-attack-spree/"><div class="top-categories__story-title">Salt Typhoon remains active, hits more telecom networks via Cisco routers</div></a></li> </ul> </div> <div class="top-categories__container"> <h3 class="top-categories__category-title">Policy</h3> <ul class="top-categories__stories"> <li class="top-categories__story" data-match-height="story0"><a class="top-categories__link" href="https://cyberscoop.com/cybercrime-computer-fraud-bill-senate/"><div class="top-categories__story-title">Bipartisan Senate bill would strengthen cybercrime penalties</div></a></li><li class="top-categories__story" data-match-height="story1"><a class="top-categories__link" href="https://cyberscoop.com/musk-doge-opm-treasury-breach/"><div class="top-categories__story-title">Cybersecurity, government experts are aghast at security failures in DOGE takeover</div></a></li><li class="top-categories__story" data-match-height="story2"><a class="top-categories__link" href="https://cyberscoop.com/federal-contractors-vulnerability-disclosure-policies-house-bill/"><div class="top-categories__story-title">Bill requiring federal contractors to have vulnerability disclosure policies gets House redo</div></a></li><li class="top-categories__story" data-match-height="story3"><a class="top-categories__link" href="https://cyberscoop.com/fbi-nominee-kash-patel-cybercrime-silk-road-surveillance-powers/"><div class="top-categories__story-title">FBI nominee Kash Patel gets questions on cybercrime investigations, Silk Road founder, surveillance powers</div></a></li> </ul> </div> </div> </main> <footer class="site-footer"> <div class="site-footer__container"> <div class="site-footer__branding"> <a href="https://scoopnewsgroup.com/" class="site-footer__branding-link"> <img src="https://cyberscoop.com/wp-content/themes/scoopnewsgroup/dist/images/logo-sng.svg" class="site-footer__branding-logo" alt="Scoop News Group"> </a> <a href="https://cyberscoop.com/about/" class="site-footer__about-link">About Us</a> </div> <div class="site-footer__links"> <nav class="site-footer__site-links"> <ul id="menu-footer-sites" class="menu"><li id="menu-item-70147" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70147"><a href="https://www.fedscoop.com/">FedScoop</a></li> <li id="menu-item-70148" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70148"><a href="https://defensescoop.com/">DefenseScoop</a></li> <li id="menu-item-70149" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70149"><a href="https://statescoop.com/">StateScoop</a></li> <li id="menu-item-70150" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70150"><a href="https://edscoop.com/">EdScoop</a></li> <li id="menu-item-70151" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-70151"><a href="https://cyberscoop.com/">CyberScoop</a></li> <li id="menu-item-70152" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70152"><a href="https://aiscoop.com/">AIScoop</a></li> </ul> </nav> <nav class="site-footer__nav"> <ul> <li id="menu-item-70142" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70142"><a href="/subscribe">Newsletters</a></li> <li id="menu-item-70143" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70143"><a href="https://scoopnewsgroup.com/oursolutions/">Advertise with us</a></li> <li id="menu-item-70144" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70144"><a href="https://cdn.fedscoop.com/2025_DigitalAdvertisingSpecs.pdf">Ad specs</a></li> <li id="menu-item-70145" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70145"><a href="tel:202208878001">(202) 887-8001</a></li> <li id="menu-item-70146" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70146"><a href="mailto:hello@cyberscoop.com">hello@cyberscoop.com</a></li> </ul> <ul class="site-footer__social-links"> <li id="menu-item-70153" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70153"><a target="_blank" href="https://www.facebook.com/cyberscoop">FB</a></li> <li id="menu-item-70154" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70154"><a target="_blank" href="https://twitter.com/cyberscoopnews">TW</a></li> <li id="menu-item-70155" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70155"><a target="_blank" href="https://www.linkedin.com/company/4847467">LinkedIn</a></li> <li id="menu-item-70156" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-70156"><a target="_blank" href="https://www.instagram.com/cyberscoopnews">IG</a></li> <li id="menu-item-81028" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-81028"><a target="_blank" href="https://www.youtube.com/@cyberscoop_sng">YT</a></li> </ul> </nav> </div> </div> </footer> <script type="text/javascript" id="avc_frontend-js-extra"> /* <![CDATA[ */ var AdRefreshControl = {"advertiserIds":[],"lineItemIds":[],"sizesToExclude":"","slotIdsToExclude":[],"viewabilityThreshold":"70","refreshInterval":"30","maximumRefreshes":"10","refreshCallback":""}; /* ]]> */ </script> <script type="text/javascript" id="wp-util-js-extra"> /* <![CDATA[ */ var _wpUtilSettings = {"ajax":{"url":"\/wp-admin\/admin-ajax.php"}}; /* ]]> */ </script> <script type="text/javascript" src="https://cyberscoop.com/_static/??-eJxtjUEOwjAMBD9Ea0oOwAHxFpS4raPEjuxE/X5DJSQOPa5mRgtbGbxwRa5QUluIDT5hUJwVbT2QSoJAViEazHq4YYx2gZ4S+9QC2pc1DqjmRXHMxGdGn61S+se/77pi7lLPpTButqi0cnb7zq/p7p7u+rhNLu4CJ0Z8" ></script> <!-- Start of HubSpot Embed Code --> <script type="text/javascript" id="hs-script-loader" async defer src="//js.hs-scripts.com/2153467.js"></script> <!-- End of HubSpot Embed Code --> </body> </html>