BT Security’s approach empowers organisations to make security practical and accessible – shifting focus to building business-wide cyber resilience Cybersecurity remains a constant contest between ...
Gartner's supply chain strategy report examines how leaders are debating different AI versions for cybersecurity amid a rise in operational threats A report from Gartner examining supply chain ...
Microsoft's research, led by CSO Eric Horvitz, reveals how AI protein design tools can create synthetic toxins that evade current biosecurity screening A study from a scientific team at Microsoft has ...
Saily's Head of Product, Matas Čenys, explains the cyber risks of free in-flight Wi-Fi, including 'evil twin' attacks targeting business travellers The expansion of complimentary in-flight Wi-Fi ...
UK government support could stabilise Jaguar Land Rover’s UK supply chain (Credit: JLR) Jaguar Land Rover secures a £1.5bn UK loan guarantee to restore its cyber-disrupted supply chain and protect ...
Cyberattacks have come thick and fast in 2025, with huge corporations including Qantas, M&S, Co-op and Microsoft all experiencing breaches in recent months. The sheer volume of the attacks is not the ...
Cybersecurity Awareness Month 2025 highlights urgent actions to protect data, with AI risks and quantum cryptography shaping new defense priorities October marks Cybersecurity Awareness Month – and ...
Asahi is the parent company of brands including Peroni, Pilsner Urquell and Grolsch Asahi’s cyberattack highlights how industrial giants must protect not just data but operational continuity to keep ...
Chief Information Security Officers face mounting pressure to secure expansive enterprise networks while supporting business agility. For Phil Swain, CISO of Extreme Networks, the challenge lies in ...
Cyber attackers have stolen customer details from Gucci, Balenciaga and Alexander McQueen (Credit: Unsplash) A ransomware attack on Gucci, Balenciaga and McQueen exposes customer data and highlights ...
BBC and Sony launch camcorder with built-in C2PA standards to verify digital content and combat synthetic media threats in news and broadcasting With the sophistication of AI outputs increasing, a key ...
As attacks rise, manufacturers turn to AI and Zero Trust tools to protect legacy systems and critical data from cyber threats across IT and OT networks The manufacturing sector is navigating a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results