Please turn on your JavaScript for this page to function normally.
lock
Cybersecurity signals: Connecting controls and incident outcomes

There is constant pressure on security leaders to decide which controls deserve the most attention and budget. A new study offers evidence on which measures are most closely …

GenAI
GenAI is fueling smarter fraud, but broken teamwork is the real problem

More than 80 percent of large U.S. companies were targeted by socially engineered fraud in the past year, according to Trustmi’s 2025 Socially Engineered Fraud & Risk …

artificial intelligence
AI is becoming a core tool in cybercrime, Anthropic warns

A new report from Anthropic shows how criminals are using AI to actively run parts of their operations. The findings suggest that AI is now embedded across the full attack …

iStorage datAshur PRO+C
Product showcase: iStorage datAshur PRO+C encrypted USB flash drive

The iStorage datAshur PRO+C is a USB-C flash drive featuring AES-XTS 256-bit hardware encryption. Available in capacities from 32 GB to 512 GB, the drive holds FIPS 140-3 …

cloud
CISOs need to think about risks before rushing into AI

Organizations are increasing investments in cloud, AI, and emerging technologies, but their infrastructure and security strategies often lag behind. A recent Unisys survey of …

predictions
Why CISOs in business services must close the edge security gap

Cloud adoption is speeding ahead in the business services sector, but security for remote and edge environments is falling behind. At the same time, generative AI is moving …

Git 2.51
Git 2.51: Preparing for the future with SHA-256

Git 2.51 is out, and the release continues the long process of modernizing the version control system. The update includes several technical changes, but one of the most …

AI agent
Bridging the AI model governance gap: Key findings for CISOs

While most organizations understand the need for strong AI model governance, many are still struggling to close gaps that could slow adoption and increase risk. The findings …

free GenAI AI courses
Free courses: Master AI tools from Microsoft, AWS, and Google

Learn how AI technologies can be applied to enhance security, create safe and responsible applications, develop intelligent agents, and improve information discovery. …

NIST
NIST finalizes lightweight cryptography standard for small devices

The National Institute of Standards and Technology (NIST) has finalized a lightweight cryptography standard to protect even the smallest networked devices from cyberattacks. …

Apricorn Aegis NVX
Product showcase: Apricorn Aegis NVX, a high-security, portable SSD

The Apricorn Aegis NVX is a hardware-based 256-Bit AES XTS external SSD drive with integrated USB-C cable. Its storage capacities range from 500GB to 2TB. The device is OS …

OT
Global OT cyber risk could top $329 billion, new report warns

A new study from Dragos and Marsh McLennan puts hard numbers on the global financial risk tied to OT cyber incidents. The 2025 OT Security Financial Risk Report estimates that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools