Cycuity Radix-ST identifies security weaknesses earlier in chip design

Cycuity introduces Radix-ST, a new product in its Radix portfolio of security solutions designed to leverage static analysis techniques to identify potential weaknesses early in the design cycle without... Read more »

ScamAgent shows how AI could power the next wave of scam calls

Scam calls have long been a problem for consumers and enterprises, but a new study suggests they may soon get an upgrade. Instead of a human scammer on the... Read more »

Where security, DevOps, and data science finally meet on AI strategy

AI infrastructure is expensive, complex, and often caught between competing priorities. On one side, security teams want strong isolation and boundaries. On the other, engineers push for performance, density,... Read more »

UK cyber security centre helps expose China-based cyber campaign

GCHQ cyber security centre and its international partners release details of malicious cyber activity linked to Chinese businesses Read more »

Maritime cybersecurity is the iceberg no one sees coming

Maritime transport, the backbone of global trade, is adapting to shifting economic, political, and technological conditions. Advances in technology have improved efficiency, bringing innovations such as remote cargo monitoring,... Read more »

Can AI make threat intelligence easier? One platform thinks so

When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t sustainable. They were manually tracking blogs, RSS feeds, and... Read more »

How CISOs are balancing risk, pressure and board expectations

AI has moved to the top of the CISO agenda. Three in five CISOs see generative AI as a security risk, with many worried about sensitive data leaking through... Read more »

What is network security? Definition and best practices

Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. Read more »

Over 28,000 Citrix instances remain exposed to critical RCE flaw CVE-2025-7775

Over 28,200 Citrix NetScaler ADC/Gateway instances remain exposed to critical RCE flaw CVE-2025-7775, already under active exploitation. Experts at the Shadowserver Foundation warn that more than 28,200 Citrix instances... Read more »

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store. “Android... Read more »
Subscribe to our Newsletter