From zero-day exploits and third-party exposure to the realities of recovery and resilience, this discussion examines why cyber risk can no longer sit solely with CISOs.
AI-driven malware is now rewriting itself mid-execution — but solid governance and cyber fundamentals still offer the strongest defence. Are businesses ready for what comes next?
AI-powered supply chains have introduced a major security blind spot: hidden dependencies. These dependencies are now the weakest links, threatening organisational security despite improved frontline defences.
A new report reveals that Russian-linked threat actors have been mounting covert campaigns against Ukrainian entities, including a large business services firm and a local government body, using minimal malware while relying heavily on built-in Windows tools and dual-use software.
Hackers working for an unnamed nation-state breached networks at Ribbon Communications, a key U.S. telecommunications services company, and remained within the firm’s systems for nearly a year without being detected, a company spokesperson confirmed in a statement on Wednesday.
A Vulnerability Operations Centre’s structured approach combined with automation’s efficiency can transform overwhelming workloads into actionable insights
U.S. Democratic Senator Ron Wyden on Wednesday requested the Federal Trade Commission “investigate and hold Microsoft responsible” for its role in a string of high-profile cybersecurity incidents in recent years, saying the company’s approach to security “continues to threaten U.S. national security.”