News

BKC Affiliate Kathy Pham introduces The United States Digital Service Origins, an oral history of the USDS featuring nearly 50 interviews telling the story of technology and government.
In order to achieve digital sovereignty and technological resilience, it is first necessary to carry out a risk analysis.
THE University of Dodoma (UDOM) has launched an international cybersecurity training programme, the first of its kind in the ...
This roundtable was convened to facilitate a conversation between techUK members, and Phil Huggins, Director of Cyber Policy ...
CyberArk's David Higgins warns of AI agents creating identity risks at a 100:1 ratio. Discover why traditional logins fail & ...
M&S executives were targeted in a ransomware attack by Scattered Spider, exposing customer data and disrupting operations.
Mutual support in the virtual world, consensus-building in digital spaces - recently, a global cooperative campaign in the ...
Just as AI introduces new threats and vulnerabilities, it also offers transformative potential in cybersecurity applications.
By Namibia Cyber Security Incident Response Team.Fake and embarrassing photos of you are circulating on social media. You discover that someone created a WhatsApp group to scrutinise or shame you.
Telecom ministers adopted today the EU blueprint for cyber crisis management, which gives guidance for the EU’s response to large-scale cybersecurity incidents or cyber crises.
To manage risk effectively and secure board-level buy-in, CISOs must stop talking about technology and start speaking the ...
As certificate renewal cycles shrink and threats grow, trust must scale. Discover why DNS and PKI convergence is the next ...