Results and prospects for AI in business applications in 2026

Agentic AI dominated enterprise IT discourse in 2025, evolving from generative AI. In 2026, AI convergence and governance will determine AI’s impact on enterprise IT Read more »

Turning plain language into firewall rules

Firewall rules often begin as a sentence in someone’s head. A team needs access to an application. A service needs to be blocked after hours. Translating those ideas into... Read more »

The roles and challenges in moving to quantum-safe cryptography

A new research project examines how organizations, regulators, and technical experts coordinate the transition to quantum safe cryptography. The study draws on a structured workshop with public sector, private... Read more »

Product showcase: Blokada for Android gives users control over network traffic

Blokada is a network privacy and ad-blocking application available on Android, iOS, Windows, macOS, and Linux. It is designed to reduce ads, block trackers, and limit unwanted network connections... Read more »

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even influence large language model (LLM) responses... Read more »

Passwords are still breaking compliance programs

The security stack has grown, but audits still stumble on passwords. CISOs see this every year. An organization may have strong endpoint tools, layered network defenses, and a documented... Read more »

What security teams miss in email attacks

Email remains the most common entry point for attackers. This article examines how phishing, impersonation, and account takeover continue to drive email breaches and expose growing security gaps across... Read more »

Fujitsu Post Office IT support team were ‘legalised hackers’

Backdoors meant it was possible for Fujitsu staff to steal money from Post Office branches, says former Fujitsu tech worker Read more »

Former Fujitsu IT support team were ‘legalised hackers’

Backdoors meant it was possible for Fujitsu staff to steal money from Post Office branches, says former Fujitsu tech worker Read more »

Russia-linked APT UAC-0184 uses Viber to spy on Ukrainian military in 2025

Russia-linked APT UAC-0184 targets Ukrainian military and government bodies via Viber, delivering malicious ZIP files for espionage in 2025. Russia-linked threat actor UAC-0184 (aka Hive0156) is targeting Ukrainian military... Read more »
Subscribe to our Newsletter