Critical infrastructure has been further defined by the Cybersecurity and Infrastructure Security Agency (CISA) as centering ...
As cybersecurity threats accelerate and compliance frameworks gain enforcement power, 2026 will mark a turning point where cyber resilience becomes a core business requirement. The cybersecurity ...
Right then, let’s talk about cybersecurity. It’s one of those things that sounds complicated, but really, it’s ...
“By 2026, cyber conflict will be a constant and hybrid domain. Nation-states will increasingly leverage criminal groups to carry out ransomware, data theft, and disruption, achieving strategic goals ...
Why we need a holistic perspective on systems designed to withstand and recover from disruptions while maintaining essential ...
TechRepublic asked cyber experts to predict the top trends that will impact the security field in 2025. The cyber landscape is more turbulent than ever. Microsoft recently reported a 2.75-fold ...
Futuristic city protected by digital dome. Concept of cyber security, smart home, internet security, data security, digital privacy, insurance and personal data protection. The notion of a "smart city ...
You're currently following this author! Want to unfollow? Unsubscribe via the link in your email. Follow Ana Altchek Every time Ana publishes a story, you’ll get an alert straight to your inbox! Enter ...
Where were you on New Year’s Eve in 1999? Many in the tech industry were holding their breath as they watched the time-dependent results of their extensive “Year 2000 projects” — also called “Y2K” for ...
The traditional traffic light system used by chief information security officers (CISOs) to report cyber risks to boards is showing signs of strain. After interviewing more than 10 CISOs across Europe ...
Cybercriminals are weaponizing artificial intelligence (AI) across every attack phase. Large language models (LLMs) craft hyper-personalized phishing emails by scraping targets' social media profiles ...
Artificial intelligence (AI) may have dominated wider tech headlines this year – and this held true in the cyber world as well – but at the same time, the security community’s concerns extend far ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results