Cyber attackers have stolen customer details from Gucci, Balenciaga and Alexander McQueen (Credit: Unsplash) A ransomware attack on Gucci, Balenciaga and McQueen exposes customer data and highlights ...
LevelBlue's 2025 report reveals manufacturers expect more AI-powered cyberattacks but less than half feel prepared, prompting urgent resilience efforts As manufacturers accelerate the adoption of AI ...
Experts say airports’ heavy reliance on third-party software shows the critical need for transparency and cross-industry collaboration to prevent attacks A ransomware attack targeting Collins ...
The new partnership integrates Mastercard's Identity insights into Entrust's security platform to strengthen fraud prevention and detection capabilities Entrust and Mastercard have expanded their ...
A coordinated cyber attack struck Heathrow, Brussels and Berlin airports European airport cyberattacks expose critical infrastructure vulnerabilities as Tenable, KnowBe4 and Keeper Security experts ...
Jaguar Land Rover's IT breach halts global production, prompting calls for AI to protect UK supply chains and support thousands of affected workers Jaguar Land Rover's (JLR) recent industrial ...
An important aspect of a data breach is reputational damage, but how much impact does a data breach actually have on trust? The vast increase of new technologies over the past few years has led to ...
A 2022 Siemens report stated that unplanned downtime costs Fortune Global 500 companies almost US$1.5tn. IBM X-Force's 2024 Threat Intelligence Report shows how manufacturing is the sector most ...
These new standards are based on lattice cryptography and hash functions IBM's Algorithms have been adopted by the US standards and technology body NIST as the world’s first post-quantum cryptography ...
Cloud computing has profoundly changed the way we live our lives . Where did it all begin? Cyber magazine takes a look at the history of cloud computing. Cloud computing has profoundly changed the way ...
Cyber Magazine takes a look at the top 10 use cases of the technology for improving a company's cyber posture With blockchain technology demonstrating strong cybersecurity applications, Cyber Magazine ...
Deepfakes do have the potential to provide an opportunity to be a positive force on our lives - if used with good intentions As AI and machine learning tools advance, IT decision makers continue to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results