ServiceNow to acquire Armis for $7.75 billion

ServiceNow entered into an agreement to acquire Armis for $7.75 billion in cash. The acquisition will expand ServiceNow’s security workflow offerings and advance AI-native, proactive cybersecurity and vulnerability response... Read more »

Five identity-driven shifts reshaping enterprise security in 2026

2026 marks the tipping point when artificial intelligence begins to fundamentally reshape cyber risk. After several years of widespread adoption, AI moves beyond influencing how we work and starts... Read more »

Cyberattack Knocks La Poste Offline, Disrupting Postal and Banking Services Across France

La Poste described the situation as “a major network incident” that affected all of its information systems. The post Cyberattack Knocks La Poste Offline, Disrupting Postal and Banking Services... Read more »

What if your face could say “don’t record me”? Researchers think it’s possible

Phones, smart glasses, and other camera-equipped devices capture scenes that include people who never agreed to be recorded. A newly published study examines what it would take for bystanders... Read more »

Conjur: Open-source secrets management and application identity

Conjur is an open-source secrets management project designed for environments built around containers, automation, and dynamic infrastructure. It focuses on controlling access to credentials such as database passwords, API... Read more »

Elementary OS 8.1 rolls out with a stronger focus on system security

Elementary OS 8.1 is now available for download and shipping on select hardware from retailers such as Star Labs, Slimbook, and Laptop with Linux. The update arrives after more... Read more »

Governance maturity defines enterprise AI confidence

AI security has reached a point where enthusiasm alone no longer carries organizations forward. New Cloud Security Alliance research shows that governance has become the main factor separating teams... Read more »

Counterfeit defenses built on paper have blind spots

Counterfeit protection often leans on the idea that physical materials have quirks no attacker can copy. A new study challenges that comfort by showing how systems built on paper... Read more »

What happens to enterprise data when GenAI shows up everywhere

Generative AI is spreading across enterprise workflows, shaping how employees create, share, and move information between systems. Security teams are working to understand where data ends up, who can... Read more »

Top 10 cyber crime stories of 2025

In many regards, 2025 proved to be a relatively normal year for the cyber security world as threat actors and security pros continued their long-running cat-and-mouse game, but it... Read more »
Subscribe to our Newsletter