Tag: Cybersecurity

The EU wants to overhaul cybersecurity to shut out ‘high-risk’ foreign entities

The EU wants to streamline its cybersecurity certification processVoluntary certification demonstrates compliance across products, services and moreNIS2...

Get the next 12 months of cybersecurity and streaming sorted with this discounted Norton VPN deal

As far as New Year's resolutions go, getting your cybersecurity sorted is certainly on the mundane side...

US cybersecurity professionals plead guilty to Blackcat ransomware attacks

Two ex-cybersecurity professionals pleaded guilty to ALPHV ransomware extortion attemptsThey extorted $1.2M from a medical device firm;...

Two cybersecurity employees plead guilty to carrying out ransomware attacks

Two former employees at cybersecurity firms - one of whom was a ransomware negotiator - have pleaded...

Top cybersecurity habits to take into 2026

The online world is rife with cyber threats, and despite our best efforts, we’re likely to slip...

Trump’s new $900 billion Pentagon funding plan includes ‘enhanced cybersecurity protections’ for Cyber Command – here’s what we know

President Trump has signed the National Defense Authorization Act into lawThe bill includes new telecoms and cybersecurity...

The power and potential of agentic AI in cybersecurity

It took just a few years for generative AI tools such as ChatGPT to become ubiquitous in...

OpenAI admits new models likely to pose ‘high’ cybersecurity risk

OpenAI warns future LLMs could aid zero‑day development or advanced cyber‑espionageCompany is investing in defensive tooling, access...

Why cybersecurity is now a strategic lever for tech firms navigating uncertainty

Cybersecurity has long been viewed as a technical safeguard, something handled by IT teams and compliance officers.But...

I’m a marathoner and a cybersecurity leader — Here’s what 26.2 miles have taught me about work

It’s mile 22, the point in a marathon where my legs feel like concrete, my brain is...

India will no longer require smartphone makers to preinstall its state-run ‘cybersecurity’ app

India will no longer require smartphone makers to preinstall the Sanchar Saathi "security" app. After blowback from...

India will require a state-owned cybersecurity app to be installed on all smartphones

Telecom regulators in India have reportedly asked smartphone manufacturers to preload a state-owned cybersecurity app that cannot...

Mindset change is key to nurturing cybersecurity innovation

When people talk about innovation in cybersecurity, they often focus on tools, technologies or frameworks.But in my...

Tackling cybersecurity burnout, once and for all

The cybersecurity sector isn’t exactly known for its calm and relaxing pace. If you’ve chosen to pursue...

Anthropic’s new model is its latest frontier in the AI agent battle — but it’s still facing cybersecurity concerns

The AI labs never sleep — especially the week before Thanksgiving, it seems. Days after Google’s buzzworthy...

Is Incognito Mode actually private? Here’s the surprising answer from cybersecurity experts

When we browse the internet using Google Chrome, Safari, Firefox or Opera, there’s an option that promises...

Protecting productivity: the imperative of cybersecurity in manufacturing

As the global landscape shifts, the manufacturing sector faces new challenges and opportunities.The integration of AI tools...

US FCC repeals cybersecurity rules aimed at preventing Salt Typhoon-esque attacks

The FCC is revoking cybersecurity regulations for telecoms companiesThese protections were introduced after network intrusion by Chinese...

VPN news live – the latest on cybersecurity, digital rights, and online privacy

From security audits and new product features, to the introduction of advanced security protocols, the VPN industry...

America’s cybersecurity defenses are cracking

It was late June, and something strange was happening on Arizona's online portal for political candidates. Images...

The unbearable lightness of getting scammed: Future of full scale cybersecurity

Technology can protect you from certain cyber threats, but it cannot protect you from falling in love...

Cybersecurity experts accused of carrying out their own attacks using dangerous ransomware

Three men allegedly deployed ALPHV ransomware against US firms, demanding cryptocurrency ransoms Victims included medical, pharma, engineering,...

The rise of agentic AI in cybersecurity

Agentic AI is quickly emerging as the next major disruption in the tech industry, moving AI from...

AI-driven cybersecurity threats are now hitting businesses from every angle – here’s how to stay safe

GenAI is fueling more convincing phishing, BEC scams, and multichannel deception campaigns, report claimsPhishing now makes up...

Security Database Used by Apple Goes Independent After Funding Cut [Updated]

Update: Following the CVE Foundation's announcement (below), CISA has said the U.S. government is extending funding to ensure no continuity

Mullvad VPN vs. NymVPN: which private network is the most anonymous?

When you need privacy, a VPN is an essential tool in disguising your location. However, you might be sharing information with the VPN provider that can be used to identify who you are and where you live, as well as revealing financial details. Fortunately, some VPN providers make an extra effort to protect your identity […]

Proton VPN vs. NymVPN: which multi-hop service is the most secure?

I went hands-on with Proton VPN and NymVPN, privacy-focused services that hide your online activity to protect you from hackers and spies.

Three best ways to sync Apple passwords to a Windows PC

Here's how I sync logins from my MacBook, iPad, and iPhone to my Windows PC so I can access my favorite accounts without retyping passwords.