IBM's Srinivas Tummalapenta: Building the cyber risk intelligence layer
Padraic O’Reilly and Srinivas Tummalapenta explore how cybersecurity is evolving from fragmented data collection to a unified cyber risk intelligence layer.
20 articles
Padraic O’Reilly and Srinivas Tummalapenta explore how cybersecurity is evolving from fragmented data collection to a unified cyber risk intelligence layer.
Matt Alderman and Evelyn Anderson explore how autonomous security programs are reshaping cyber governance.
Gibb Witham explains why organizations must move beyond assumed AI capability toward measurable, validated cyber readiness for both humans and AI systems.
The 311 members of Parliament who voted against an extension did so despite strong support from law enforcement, children’s rights groups, German Chancellor ...
Google fast-tracks post-quantum cryptography with a 2029 deadline as researchers warn quantum computers could break current encryption sooner than expected.
Mark Lambert discusses the company's new AI Exposure Management (AIEM) solution.
Arunesh Chandra discusses why security and IT teams are rethinking the role of the browser.
The FBI said it was aware of hackers targeting Patel’s personal email, and that no government information was taken. The post Iranian hackers, Handala, claim...
The parliamentary report warns that hostile actors are conducting sustained and increasingly sophisticated campaigns to interfere in democratic processes, ex...
Lloyds Banking Group has identified the glitch that led to some of its customers being able to see details of other customers’ transactions on March 12. It r...
Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of web-based attacks and urge the...
Ramin Farassat discusses how a new approach to browser security is required to provide architectural immunity.
An FBI spokesperson told Recorded Future News that the information is “historical in nature and involves no government information,” adding that the agency h...
The group that it was making available for download emails and other documents from Patel’s account. The post Pro-Iranian Hacking Group Claims Credit for Hac...
Rob Juncker explores why human behavior has become the defining variable in enterprise cybersecurity.