As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026.
AI dominated all tech conversations this year, but the concerns of cyber security professionals extend far beyond. From remote work to supply chains, quantum to identity, there were plenty of other ...
The five main types are network security, application security, information security, endpoint security, and cloud security.
Andrew Bailey, governor of the Bank of England, articulated his belief that cyber attacks represent one of the most ...
Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to ...
Chief Adviser and Chairman of the National Cyber Security Council Professor Muhammad Yunus has directed the National Cyber ...
Honeybadger Solutions LLC is a veteran-owned risk management leader offering a one-stop shop for elite security, investigations, digital forensics, and cyber intelligence. Their comprehensive services ...
The US Cybersecurity and Infrastructure Security Agency says that media reports about it being directed to no longer follow or report on Russian cyber activity are untrue, and its mission remains ...
Panagiotis (Panos) Vlachos's employer, Mastercard, covers his tuition fees. He is an active volunteering member of CyberPeace Builders and ISC2's Code TaskForce. Satellites are the invisible backbone ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results