News

BKC Affiliate Kathy Pham introduces The United States Digital Service Origins, an oral history of the USDS featuring nearly 50 interviews telling the story of technology and government.
In order to achieve digital sovereignty and technological resilience, it is first necessary to carry out a risk analysis.
Just as AI introduces new threats and vulnerabilities, it also offers transformative potential in cybersecurity applications.
By Namibia Cyber Security Incident Response Team.Fake and embarrassing photos of you are circulating on social media. You discover that someone created a WhatsApp group to scrutinise or shame you.
Telecom ministers adopted today the EU blueprint for cyber crisis management, which gives guidance for the EU’s response to large-scale cybersecurity incidents or cyber crises.
To manage risk effectively and secure board-level buy-in, CISOs must stop talking about technology and start speaking the ...
As certificate renewal cycles shrink and threats grow, trust must scale. Discover why DNS and PKI convergence is the next ...
The Nigerian Communications Commission (NCC) yesterday began moves to put in place a comprehensive cyber security framework ...
A digital-first payment strategy is designed around the way customers interact with businesses today — across devices, time ...
Cyber security industry urged to give inexperienced but certified youth a chance By Christopher Tredger, Portals editorJohannesburg, 04 Jun 2025Nicole Cader from Absa; Andy Kennedy from Cloudflare; ...
The Government is enhancing Jamaica’s cybersecurity resilience through a comprehensive strategy that strengthens prevention, ...
The city of Abilene is still in recovery mode after a cyberattack from foreign hackers was discovered over six weeks ago, ...