Enterprise
Your SBOM won't save you: Closing the provenance gap in software security
"The industry has spent five years building better autopsies. Now it needs to start building gates."
Enterprise
"The industry has spent five years building better autopsies. Now it needs to start building gates."
Quantum
Q-Day - the moment when quantum computers will be able to crack traditional cryptography - may not be a notional future threat forever.
AI
Bots can hide secret information that's invisible to most humans within LLM-generated "synthetic multimedia content".
Enterprise
"Employees are not trying to be reckless, but unmanaged AI creates a direct path for sensitive data and information to leave the business."
Cyberwar
High-risk figures warned to exercise extreme caution when using WhatsApp, Signal and other third-party applications.
Quantum
Research sheds new light on Google’s decision to accelerate its shift to post-quantum cryptography.
Financial Systems
Financial crime is now a complex web spun by coordinated networks—and investigators face a difficult task untangling it.
Quantum
Traditional encryption may soon be trivial to crack - prompting adversaries to gather sensitive protected data they can access in future.
Security
Rapid7 uncovers "ongoing" espionage campaign involving long-term persistence within highly sensitive communications environments.
Security
Adversaries are pushing beyond the perimeter to exploit the trusted infrastructure that keeps global businesses running.
Government
Blocking sales of foreign-made routers will fail to secure vast numbers of older devices described as threat actors’ “attack vector of choice”.
Cyberwar
"AI investments within national defence departments risk coming to nothing if command-and-control systems aren’t backed by agile data flow."