Resilience under pressure: How regional conflict is reshaping the Middle East tech strategy

From AWS outages in the UAE to stronger focus on data control and cyber security, tech leaders say the Israel-US-Iran conflict is challenging, but not stopping the region’s digital... Read more »

Samsung brings Digital Home Key to Samsung Wallet, extending secure access to the home

Samsung Electronics has announced the launch of Digital Home Key, a new feature within Samsung Wallet built on Aliro, a standardized smart lock access protocol that enables Samsung Galaxy... Read more »

AI went from assistant to autonomous actor and security never caught up

Enterprise AI deployments have shifted from pilot programs to production systems handling customer data, executing business transactions, and integrating with core infrastructure. That has exposed a significant gap between... Read more »

Healthcare organizations are accepting cyber risk to cut costs

Healthcare organizations are cutting cybersecurity budgets under financial pressure even as the threats targeting their systems intensify. A PwC survey of 381 global healthcare executives, conducted between May and... Read more »

5 years of shifting cybersecurity behavior

Online security is built through routine decisions made across devices and accounts. People choose how to create passwords, how often to reuse them, and how much effort to invest... Read more »

Cybersecurity jobs available right now: March 3, 2026

AI & Data Security Expert Ferrero | Italy | Hybrid – View job details As an AI & Data Security Expert, you will define and maintain security controls for... Read more »

Middle east crisis prompts UK NCSC warning on potential Iranian cyber activity

UK’s NCSC warns of potential Iranian cyberattacks as Middle East tensions rise, urging vigilance from exposed organizations. The UK’s National Cyber Security Centre (NCSC) has warned organizations of a... Read more »

Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem

Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops... Read more »

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all... Read more »

NCSC: No increase in cyber threat from Iran, but be prepared

While cyber threat levels remain stable following the outbreak of war in the Middle East at the weekend, at-risk organisations in the UK should take steps now to ward... Read more »
Subscribe to our Newsletter