GenAI just got legally complicated
A cybersecurity lawyer explains recent developments in generative AI governance – and what this means for CISOs.
Read MoreA cybersecurity lawyer explains recent developments in generative AI governance – and what this means for CISOs.
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreDiscover why ‘vibe coding’ is opening up new risks in cybersecurity, as AI-generated code and hidden misconfigurations create an urgent need for human oversight.
Read More55% of open source malware now targets developers. Here’s why data exfiltration is a top threat to supply chains in 2025 – and how to defend against it.
Read MoreRailway CISO Dimitri Van Zantvliet explains how cybersecurity has evolved from mechanical safeguards to AI-driven systems, and why defending critical infrastructure is about trust and public safety.
Read MoreHigh-volume transactions and enthusiastic users mean gaming platforms are vulnerable to phishing, infostealers, and DDoS disruption
Read MoreHow do you get your first job in cybersecurity? Break things. Because cultivating your hacker mindset can help you differentiate yourself in a competitive market for entry-level infosec roles.
Read MoreM&A can be a golden opportunity for malicious hackers. Find out how rushed integrations, open-source risks, and weak access controls turn acquisitions into cybersecurity minefields.
Read More