News

AI adoption is greatly outpacing AI security and governance, according to the latest data from IBM. The latest iteration of its Cost of a Data Breach Report finds that, while the rapid adoption of AI ...
Allianz Life Insurance Company of North America has confirmed that hackers accessed personal data belonging to most of its 1.4 million customers through a breach of a third-party cloud-based customer ...
As quantum threats loom, Fortinet’s FortiOS 7.6 is empowering firms with built-in quantum-safe security, facilitating a seamless post-quantum transition Despite safeguarding sensitive data for decades ...
Enterprise organisations are implementing AI systems in production environments faster than they are securing them, according to SandboxAQ ’s inaugural AI Security Benchmark Report. The AI startup’s ...
Meta CEO Mark Zuckerberg & former executives settle shareholder lawsuit over Facebook privacy breaches & Cambridge Analytica scandal for undisclosed terms Mark Zuckerberg and former executives of Meta ...
Encrypted network traffic represents one of cybersecurity’s most persistent challenges. While encryption protects data in transit, it creates blind spots for security teams trying to monitor network ...
A major cyberattack targeting Microsoft's SharePoint servers has now been linked to state-backed Chinese hacking groups, affecting thousands worldwide A massive cyberattack recently targeted Microsoft ...
IT decision makers consider the increase of AI as an area of concern, as business leaders fail to grasp the potentially devastating impact that this technology could have on businesses, if used ...
An important aspect of a data breach is reputational damage, but how much impact does a data breach actually have on trust?
Where did cybersecurity begin? Cyber magazine takes a look at the history of cybersecurity from inception to the present day.
In the last year the cybersecurity landscape has seen a dramatic transformation. The growing demand for effective, worldwide threat intelligence continues to intensify as geopolitical and economic ...
With blockchain technology demonstrating strong cybersecurity applications, Cyber Magazine examines the Top 10 Blockchain cybersecurity uses you can deploy ...