Newsy.co

Woocommerce.co Cybersecurity news

Why enterprises are turning to Cohesity for cyber resilience

Through Axiz, Cohesity brings enterprise-grade cyber resilience solutions to organisations across South Africa.

Dell Cyber Recovery, Security Stretches to Apex, Azure

Dell expanded the reach and availability of its cybersecurity and cyber recovery services in a move that mirrors growing enterprise concerns over ransomware and cyberattacks. The vendor’s Cyber ...

Selby Jennings' Future of Financial Services 2026 - Audit with Jack McCarthy

After a quieter 2024, the audit market rebounded in 2025, driven by regulatory pressure and accelerated digital transformation across industries. From cyber resilience to AI governance, the expectations placed on audit teams are rising, and so is demand for talent. In this video, Jack McCarthy, Vice President at Selby Jennings, shares how the market has evolved and what firms should prioritise when building audit teams in 2026. Click here for a full write-up and explore insights from other sec

CISA and USCG Issue Joint Advisory to Strengthen Cyber Hygiene in Critical Infrastructure

CISA, in partnership with the U.S. Coast Guard (USCG), released a joint Cybersecurity Advisory aimed at helping critical infrastructure organizations improve their cyber hygiene. This follows a ...

Remediation Times Drop Sharply as Cyber Hygiene Take Up Surges

Critical national infrastructure (CNI) providers are getting better at remediating exploited vulnerabilities and other cyber hygiene best practices, according to the US Cybersecurity and ...

CESER chief touts AI projects as congressional Dems point to federal cuts

A Trump administration official endorsed a slate of congressional bills Tuesday targeting cybersecurity in the energy sector while touting the office’s new emphasis on AI-driven cyber defenses. Meanwhile, Democratic members repeatedly pressed him over the cybersecurity and reliability impacts from thousands of job cuts that have taken place at the Department of Energy over the past year.At a House Energy and Commerce Committee hearing, Alex Fitzsimmons, acting director at the Department of Energ

Cyber Resilience: What Boards Need To Know Now

Nancy Morgan, Dave Rankin, Niloo Razi, Leslie Ireland, and Georgianna Shea discuss the board's role in cyber resilience during "Cyber Strategy Meets Business Objectives" at The Cyber Guild's Uniting ...

Cyber hygiene tips to cut ransomware risk in 2026

As ransomware and phishing surge, Rochester cybersecurity experts urge businesses to strengthen cyber hygiene with training, cloud security and preventive habits.

Ashdod Port boosts investment in Israeli cyber‑resilience start-up Salvador Technologies

Ashdod Port has been increasing its focus on strengthening cyber resilience across critical operational technology ...

Autonomous Cyber Resilience

TNO’s methodologies and tools embed autonomous cyber resilience (ACR) into critical digital systems for improved resilience against increasing threats.

Time to restore America’s cyberspace security system

China’s campaign to break into our critical infrastructure and federal government networks is persistent and growing. Beijing is stealing information while also planting tools and maintaining access in key systems, giving it the option to pressure the United States in the future. Russia also continues to test our critical infrastructure with increasingly sophisticated operations, support criminal operations, gather intelligence, and possibly prepare for future disruption of essential services. I

Resilience for resilience: Managing burnout among cyber leaders

The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path.

Strengthen Your Business Security with Effective Cyber Hygiene

Strengthen Your Business Security with Effective Cyber HygieneIn today’s digital landscape, businesses of all sizes face increasing cybersecurity threats. From ransomware attacks to phishing scams, the risks are ever-evolving. Effective cyber hygiene is critical for safeguarding your IT assets, ensuring business continuity, and protecting sensitive data. Companies that neglect basic cybersecurity practices are more vulnerable to breaches that can lead to financial loss, reputational damage, and

Opinion: Tips for Cyber Resilience in Higher Education

Higher education institutions are more prepared for cyber attacks if they prioritize data security, categorize their data, maintain robust backups, and implement access controls and life cycle management processes.

AI’s New Frontier: How Predictive Cyber Resilience Is Building Self-Defending Systems

That’s the aim of predictive cyber resilience (PCR)—an emerging approach to security built on intelligence, automation and ...

Former incident responders plead guilty to ransomware attack spree

Former cybersecurity professionals Ryan Clifford Goldberg and Kevin Tyler Martin pleaded guilty Thursday to participating in a series of ransomware attacks in 2023 while they were employed at cybersecurity companies tasked with helping organizations respond to ransomware attacks.Goldberg, who was a manager of incident response at Sygnia, and Martin, a ransomware negotiator at DigitalMint at the time, collaborated with an unnamed co-conspirator to attack victim computers and networks and use ALPH

Techstrong TV Livestream – December 16, 2025

• Techstrong Gang – TSG Ep. 987: Broadcom’s $21B custom chip bet and growing reliance on Google, AI data center pushback, and IBM’s Project Alice multi-agent approach to IT operations. • Anthony Ricci (DigiCert): Post-quantum cryptography progress, strategic alliances, certificate management, and why validating AI agents is becoming critical for security. • Mike Lynch (Auditoria AI): How AI is transforming finance teams by automating routine work and reshaping finance operations and decision-m

Aerospace Cybersecurity Strategy: Building Resilient Embedded Systems at Mission Speed

Modern aerospace platforms—including crewed aircraft, satellites, UAVs, and ground systems—are increasingly targeted by sophisticated cyber threats. As supply chain scrutiny grows and adversaries focus on software weaknesses, aerospace engineering teams must move beyond safety-only designs to build cyber resilience directly into embedded systems. In this on-demand webinar, Shane Fry, CTO at RunSafe Security, and Patrick Miller, Product Manager at Lynx, discuss practical strategies for securing

Defenders on the Frontline: Incident Response and Threat Intel Under the Microscope

Join this panel of CISOs and threat-intel professionals for a deep-dive on aligning incident response and threat intelligence with broader business objectives. Panelists will explore practical strategies for managing an ever-expanding attack surface, offering candid recommendations into how enterprises can refine their cyber resilience plans and secure hardware, software and vendor supply chains. Participants: Jonathan Jaffe, CISO, Lemonade Shane Hasert – Director – Threat Research and Cyber S

Senate Intel chair urges national cyber director to safeguard against open-source software threats

Senate Intelligence Committee Chairman Tom Cotton is raising the spectre of foreign adversaries playing too heavy a role in open-source software, and asking the national cyber director to counter the risks.The Arkansas Republican wrote to National Cyber Director Sean Cairncross Thursday, saying he was concerned about reports that “state-sponsored software developers and cyber espionage groups have started to exploit this communal environment, which assumes that contributors are benevolent, to in