Why enterprises are turning to Cohesity for cyber resilience
Through Axiz, Cohesity brings enterprise-grade cyber resilience solutions to organisations across South Africa.
Through Axiz, Cohesity brings enterprise-grade cyber resilience solutions to organisations across South Africa.
Dell expanded the reach and availability of its cybersecurity and cyber recovery services in a move that mirrors growing enterprise concerns over ransomware and cyberattacks. The vendor’s Cyber ...
After a quieter 2024, the audit market rebounded in 2025, driven by regulatory pressure and accelerated digital transformation across industries. From cyber resilience to AI governance, the expectations placed on audit teams are rising, and so is demand for talent. In this video, Jack McCarthy, Vice President at Selby Jennings, shares how the market has evolved and what firms should prioritise when building audit teams in 2026. Click here for a full write-up and explore insights from other sec
CISA, in partnership with the U.S. Coast Guard (USCG), released a joint Cybersecurity Advisory aimed at helping critical infrastructure organizations improve their cyber hygiene. This follows a ...
Critical national infrastructure (CNI) providers are getting better at remediating exploited vulnerabilities and other cyber hygiene best practices, according to the US Cybersecurity and ...
A Trump administration official endorsed a slate of congressional bills Tuesday targeting cybersecurity in the energy sector while touting the office’s new emphasis on AI-driven cyber defenses. Meanwhile, Democratic members repeatedly pressed him over the cybersecurity and reliability impacts from thousands of job cuts that have taken place at the Department of Energy over the past year.At a House Energy and Commerce Committee hearing, Alex Fitzsimmons, acting director at the Department of Energ
Nancy Morgan, Dave Rankin, Niloo Razi, Leslie Ireland, and Georgianna Shea discuss the board's role in cyber resilience during "Cyber Strategy Meets Business Objectives" at The Cyber Guild's Uniting ...
As ransomware and phishing surge, Rochester cybersecurity experts urge businesses to strengthen cyber hygiene with training, cloud security and preventive habits.
Ashdod Port has been increasing its focus on strengthening cyber resilience across critical operational technology ...
TNO’s methodologies and tools embed autonomous cyber resilience (ACR) into critical digital systems for improved resilience against increasing threats.
China’s campaign to break into our critical infrastructure and federal government networks is persistent and growing. Beijing is stealing information while also planting tools and maintaining access in key systems, giving it the option to pressure the United States in the future. Russia also continues to test our critical infrastructure with increasingly sophisticated operations, support criminal operations, gather intelligence, and possibly prepare for future disruption of essential services. I
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path.
Strengthen Your Business Security with Effective Cyber HygieneIn today’s digital landscape, businesses of all sizes face increasing cybersecurity threats. From ransomware attacks to phishing scams, the risks are ever-evolving. Effective cyber hygiene is critical for safeguarding your IT assets, ensuring business continuity, and protecting sensitive data. Companies that neglect basic cybersecurity practices are more vulnerable to breaches that can lead to financial loss, reputational damage, and
Higher education institutions are more prepared for cyber attacks if they prioritize data security, categorize their data, maintain robust backups, and implement access controls and life cycle management processes.
That’s the aim of predictive cyber resilience (PCR)—an emerging approach to security built on intelligence, automation and ...
Former cybersecurity professionals Ryan Clifford Goldberg and Kevin Tyler Martin pleaded guilty Thursday to participating in a series of ransomware attacks in 2023 while they were employed at cybersecurity companies tasked with helping organizations respond to ransomware attacks.Goldberg, who was a manager of incident response at Sygnia, and Martin, a ransomware negotiator at DigitalMint at the time, collaborated with an unnamed co-conspirator to attack victim computers and networks and use ALPH
• Techstrong Gang – TSG Ep. 987: Broadcom’s $21B custom chip bet and growing reliance on Google, AI data center pushback, and IBM’s Project Alice multi-agent approach to IT operations. • Anthony Ricci (DigiCert): Post-quantum cryptography progress, strategic alliances, certificate management, and why validating AI agents is becoming critical for security. • Mike Lynch (Auditoria AI): How AI is transforming finance teams by automating routine work and reshaping finance operations and decision-m
Modern aerospace platforms—including crewed aircraft, satellites, UAVs, and ground systems—are increasingly targeted by sophisticated cyber threats. As supply chain scrutiny grows and adversaries focus on software weaknesses, aerospace engineering teams must move beyond safety-only designs to build cyber resilience directly into embedded systems. In this on-demand webinar, Shane Fry, CTO at RunSafe Security, and Patrick Miller, Product Manager at Lynx, discuss practical strategies for securing
Join this panel of CISOs and threat-intel professionals for a deep-dive on aligning incident response and threat intelligence with broader business objectives. Panelists will explore practical strategies for managing an ever-expanding attack surface, offering candid recommendations into how enterprises can refine their cyber resilience plans and secure hardware, software and vendor supply chains. Participants: Jonathan Jaffe, CISO, Lemonade Shane Hasert – Director – Threat Research and Cyber S
Senate Intelligence Committee Chairman Tom Cotton is raising the spectre of foreign adversaries playing too heavy a role in open-source software, and asking the national cyber director to counter the risks.The Arkansas Republican wrote to National Cyber Director Sean Cairncross Thursday, saying he was concerned about reports that “state-sponsored software developers and cyber espionage groups have started to exploit this communal environment, which assumes that contributors are benevolent, to in