BT Security’s approach empowers organisations to make security practical and accessible – shifting focus to building business-wide cyber resilience Cybersecurity remains a constant contest between ...
Gartner's supply chain strategy report examines how leaders are debating different AI versions for cybersecurity amid a rise in operational threats A report from Gartner examining supply chain ...
Microsoft's research, led by CSO Eric Horvitz, reveals how AI protein design tools can create synthetic toxins that evade current biosecurity screening A study from a scientific team at Microsoft has ...
Saily's Head of Product, Matas Čenys, explains the cyber risks of free in-flight Wi-Fi, including 'evil twin' attacks targeting business travellers The expansion of complimentary in-flight Wi-Fi ...
A coordinated cyber attack struck Heathrow, Brussels and Berlin airports European airport cyberattacks expose critical infrastructure vulnerabilities as Tenable, KnowBe4 and Keeper Security experts ...
Cybersecurity Awareness Month 2025 highlights urgent actions to protect data, with AI risks and quantum cryptography shaping new defense priorities October marks Cybersecurity Awareness Month – and ...
Asahi is the parent company of brands including Peroni, Pilsner Urquell and Grolsch Asahi’s cyberattack highlights how industrial giants must protect not just data but operational continuity to keep ...
Cyber attackers have stolen customer details from Gucci, Balenciaga and Alexander McQueen (Credit: Unsplash) A ransomware attack on Gucci, Balenciaga and McQueen exposes customer data and highlights ...
LevelBlue's 2025 report reveals manufacturers expect more AI-powered cyberattacks but less than half feel prepared, prompting urgent resilience efforts As manufacturers accelerate the adoption of AI ...
BBC and Sony launch camcorder with built-in C2PA standards to verify digital content and combat synthetic media threats in news and broadcasting With the sophistication of AI outputs increasing, a key ...
Experts say airports’ heavy reliance on third-party software shows the critical need for transparency and cross-industry collaboration to prevent attacks A ransomware attack targeting Collins ...
Chief Information Security Officers face mounting pressure to secure expansive enterprise networks while supporting business agility. For Phil Swain, CISO of Extreme Networks, the challenge lies in ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results