A flaw could allow recovery of the phone number associated with any Google account

A vulnerability could allow recovery of the phone number associated with a Google account by carrying out a brute force attack. The security researcher who goes online with the... Read more »

Investor behaviour in the wake of cyber’s ‘black swan’ moment

So-called Black Swan events expose the blind spots in even the most sophisticated forecasting models, signaling a need to rethink how businesses, and those investing in them, quantify and... Read more »

Government using national security as ‘smokescreen’ in Apple encryption row

Senior conservative MP David Davis says the Home Office should disclose how many secret orders it has issued against telecoms and internet companies to Parliament Read more »

Sentra boosts regulatory readiness for large enterprises

Sentra launched its DSAR automation capability, purpose-built to help large, complex organizations respond to Data Subject Access Requests (DSARs) under regulations such as GDPR, CCPA, and other global privacy... Read more »

Red Canary AI agents accelerate incident response

Red Canary unveiled a new suite of expert AI agents. These specialized agents combine the speed and scalability of agentic AI with the quality and consistency of standard operating... Read more »

Vanta AI Agent automates time-consuming GRC workflows

Vanta announced the Vanta AI Agent, marking a major leap forward in how security and compliance teams leverage AI to minimize human error and maximize impact. The Vanta AI... Read more »

OWASP Nettacker: Open-source scanner for recon and vulnerability assessment

OWASP Nettacker is a free, open-source tool designed for network scanning, information gathering, and basic vulnerability assessment. Built and maintained by the OWASP community, Nettacker helps security pros automate... Read more »

The path to better cybersecurity isn’t more data, it’s less noise

In cybersecurity, there’s an urge to collect as much data as possible. Logs, alerts, metrics, everything. But more data doesn’t necessarily translate to better security. SOCs deal with tens... Read more »

How to build AI into your business without breaking compliance

AI is supposed to make businesses faster, smarter, and more competitive, but most projects fall short. The Cloud Security Alliance (CSA) says the real issue is companies cramming AI... Read more »

Cyber Bill at risk of becoming a missed opportunity, say MPs

An APPG report warns that the government’s flagship cyber security legislation is too narrow in its scope and risks missing opportunities to embed resilience at the heart of the... Read more »
Subscribe to our Newsletter