Have you read/watched Dune?
In Dune, power flows to the one who can destroy a thing. In cybersecurity, attackers now hold similar leverage over identity and systems.
Read MoreIn Dune, power flows to the one who can destroy a thing. In cybersecurity, attackers now hold similar leverage over identity and systems.
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreIn Dune, power flows to the one who can destroy a thing. In cybersecurity, attackers now hold similar leverage over identity and systems.
Read MoreFrom fake celebrity endorsements to cloned voices in mobile scams, 2025 proved that deepfakes are now a real business and consumer risk.
Read MoreAs AI tools move from pilots to the fabric of everyday work, the same systems that boost productivity are leaking sensitive data and stretching identity controls past their limits.
Read MoreA contrarian take on AI in 2026: why security teams may actually need AI to become dull, predictable, and standardised – and how that shift could reduce risk.
Read MoreAI is now woven into every layer of modern software development, but most security teams can’t see where or how it’s being used.
Read MoreNew data shows the CISO role is already under strain, and heading into an even tougher year.
Read More