News

Trend Micro finds AI & open-source tools aid criminals in turning security blogs into partial malware, complicating attack attribution & fuelling copycats Cybersecurity giant Trend Micro is ...
Production of a vehicle at JLR's Halewood plant ( Image credit: JLR) Jaguar Land Rover orders factory staff to stay home as cyberattack halts production, highlighting risks of digital disruption in ...
GTT’s Vice President of Enterprise Sales Jesse Okerlund on innovating enterprise security, the Envision platform and the future of network compute Networking and security have never been more complex.
In the last year the cybersecurity landscape has seen a dramatic transformation. The growing demand for effective, worldwide threat intelligence continues to intensify as geopolitical and economic ...
Where did cybersecurity begin? Cyber magazine takes a look at the history of cybersecurity from inception to the present day. Cybersecurity is becoming increasingly significant due to the increased ...
An important aspect of a data breach is reputational damage, but how much impact does a data breach actually have on trust? The vast increase of new technologies over the past few years has led to ...
Deepfakes do have the potential to provide an opportunity to be a positive force on our lives - if used with good intentions As AI and machine learning tools advance, IT decision makers continue to ...
Remote working doesn't come without risk. we’ll explore the top 10 risks of remote working and how you can protect your business from cyberattacks. The rise of remote working has created a new range ...
A 2022 Siemens report stated that unplanned downtime costs Fortune Global 500 companies almost US$1.5tn. IBM X-Force's 2024 Threat Intelligence Report shows how manufacturing is the sector most ...
These new standards are based on lattice cryptography and hash functions IBM's Algorithms have been adopted by the US standards and technology body NIST as the world’s first post-quantum cryptography ...
Cloud computing has profoundly changed the way we live our lives . Where did it all begin? Cyber magazine takes a look at the history of cloud computing. Cloud computing has profoundly changed the way ...
CrowdStrike has released its 2025 Global Threat Report finding a rise in Chinese cyber attacks, growing AI application and more CrowdStrike's 2025 Global Threat Report finds a rapid rise in ...