UK AI Safety Summit: Global Powers Make ‘Landmark’ Pledge to AI Safety

Global leaders from 28 nations have gathered in the U.K. for an influential summit dedicated to AI regulation and safety. Here’s what you need to know. Read more »

G7 Countries Establish Voluntary AI Code of Conduct

The code of conduct provides guidelines for AI regulation across G7 countries and includes cybersecurity considerations and international standards. Read more »

Amazon Web Services Launches Independent European Cloud as Calls for Data Sovereignty Grow

The AWS Sovereign Cloud will be physically and logically separate from other AWS clouds and has been designed to comply with Europe’s stringent data laws. Read more »

Australian CEOs Struggling to Face Cyber Risk Realities

Research has found 91% of CEOs view IT security as a technical function that’s the CIO or CISO’s problem, meaning IT leaders have more work to do to engage... Read more »

Google Offers Bug Bounties for Generative AI Security Vulnerabilities

Google’s Vulnerability Reward Program offers up to $31,337 for discovering potential hazards. Google joins OpenAI and Microsoft in rewarding AI bug hunts. Read more »

The Essential Guide to Security Data

Organizations must use every available resource to protect against the latest cyberattacks, the persistent nature of advanced threats, as well as the ease with which malware can cripple an... Read more »

Top 50 Cybersecurity Threats

Cybercriminals continue to look for new and innovative ways to infiltrate organizations. As threats continue to grow and evolve, you need to understand what your organization is up against... Read more »

The CISO Report: Emerging Trends, Threats, and Strategies for Security Leaders

The job of a chief information security officer (CISO) isn’t what it used to be — in fact, 86% of CISOs say their role has changed so much since... Read more »

The SIEM Buyer’s Guide

With a data-driven, modern security information and event management (SIEM) solution, your organization can strengthen cybersecurity, drive resilience and unlock innovation across cloud, multicloud and hybrid environments. Download The... Read more »

The PEAK Threat Hunting Framework

Organizations rely on threat hunting to identify malicious activity, improve security and mitigate risk. The PEAK Threat Hunting Framework — a practical, vendor-agnostic, customizable approach to threat hunting, designed... Read more »
Subscribe to our Newsletter