Has AI hype reached its peak?
AI hype is peaking. Dr Rumman Chowdhury explains why use cases remain limited, AGI definitions are shifting, and investors are starting to question the narrative.
Read MoreAI hype is peaking. Dr Rumman Chowdhury explains why use cases remain limited, AGI definitions are shifting, and investors are starting to question the narrative.
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreAI hype is peaking. Dr Rumman Chowdhury explains why use cases remain limited, AGI definitions are shifting, and investors are starting to question the narrative.
Read MoreIs cybersecurity education still relevant in the age of AI? Dr Rumman Chowdhury explores how AI is reshaping learning, expertise, and the skills security professionals need.
Read MoreThe Black Hat Files launches with Dr. Rumman Chowdhury. A sharp look at AI, adversarial testing and what security teams need to know now.
Read MoreBlack Hat MEA is redefining the cybersecurity conference experience. CISOs share why it feels more intentional, collaborative and energising – and how that drives resilience.
Read MoreRansomware is evolving beyond encryption. 2026 threat reports reveal the rise of data-leak extortion, pre-encryption exfiltration and a growing ecosystem of cybercriminal groups targeting sensitive data.
Read MoreAI-driven attacks are accelerating identity compromise. New 2026 threat data shows why identity and access management now defines cybersecurity resilience.
Read More