Nic Sarginson, Principal Product Manager at Yubico explores how passkeys, hardware security keys and verifiable credentials are reshaping digital identity Good news to those exhausted by password ...
After its recent clash with the US Government over military use of AI, Anthropic is back at the White House, this time to discuss the implications of their most powerful AI model yet – Claude Mythos.
CrowdStrike has rallied industry giants into a coalition to assess, prioritise & patch the vulnerabilities lurking within enterprises, discovered using AI “More vulnerabilities will be found in the ...
Infor Research shows that more than half of the businesses struggle to scale AI, with data security, sovereignty & privacy emerging as the primary concerns While business confidence in AI continues to ...
UK Government commits £90m to secure SMEs, calling on AI companies to collaborate on building national cyber defence and sign the Cyber Resilience Pledge Amid the explosion of frontier AI models and ...
Brooke Johnson explains the case for 'treating AI like an employee', with every system needing a manager and clear performance goals As enterprise AI adoption accelerates, organisations face mounting ...
Warren O'Driscoll, Head of Security Practice, Services & Solutions at NTT DATA UK&I. Credit: NTT DATA Warren O'Driscoll, NTT DATA's Head of Security Practice, Services & Solutions explains what ...
As supply chain & third-party vendor risks dominate the threat landscape, Cyber Magazine's picks the top Vendor Risk Management Platforms for businesses In these instances, the attackers didn't hack ...
OpenAI released GPT 5.4-Cyber, a highly cyber permissive model, as it scales Trusted Access for Cyber ensuring that critical AI tools favour defenders OpenAI has launched GPT-5.4-Cyber – a specialised ...
Recorded Future's State of Security Report 2026 shows increasing state-sponsored espionage, as nations resort to covert cyber operations during conflicts Cybersecurity is not just about ransom or data ...
Synthetic media blurs the line between real and AI-generated faces and voices. Picture: Getty Images As deepfakes scale in 2026, businesses must rethink identity, trust and defence – moving beyond ...
The European Commission's cybersecurity package includes easing compliance, elimination of 'high-risk suppliers' from third countries and empowering ENISA European countries, being high-value targets ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results