Please turn on your JavaScript for this page to function normally.
Cybersecurity news
Focus spotlight
- Google study finds LLMs are embedded at every stage of abuse detection
- Cloudflare moves up its post-quantum deadline as researchers narrow the path to Q-Day
- Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR
- Product showcase: Proton Authenticator is an end-to-end encrypted, open source 2FA app
- Which messaging app takes the most limited approach to permissions on Android?
- Tracking drones with the 5G tower down the street
Industry news
- Secureframe expands Comply with User Access Reviews for automated governance
- Acronis MDR by TRU brings 24/7 managed detection and response to MSPs
- APERION releases SmartFlow SDK for secure, on-prem AI governance without cloud reliance
- New Red Hat subscription simplifies long-term enterprise Linux support
- Exabeam expands ABA to detect AI agent threats across ChatGPT, Copilot, and Gemini
CISO focus
- What managing partners should ask AI vendors before signing any contract
- The case for fixing CWE weakness patterns instead of patching one bug at a time
- CISOs grapple with AI demands within flat budgets
- Trust, friction, and ROI: A CISO’s take on making security work for the business
- Mimecast makes enterprise email security deployable in minutes
Latest resources
- CIS Benchmarks March 2026 Update
- Download: 2026 SANS Identity Threats & Defenses Survey
- You don’t have to choose between BAS or automated pentesting, you shouldn’t
- Webinar: The True State of Security 2026
- Secure by Design: Building security in at the beginning
- The era of the Digital Parasite: Why stealth has replaced ransomware









