News

Ed, Microsoft's Dan Coleman explains how agencies can integrate identity, telemetry, and real-time visibility across their environments to establish a more secure zero-trust posture.
Large language models are not just the future of cybersecurity—they’re the context engine that makes the rest of your ...
UPenn to update swimming records set by Lia Thomas, settling with feds on transgender athletes case Federal judge halts the ...
Email bombing, one of the more dangerous cybercrime tactics, will now automatically be identified and mitigated in Office 365 ...
Keeping pace with frequent product changes, shifting licensing models, tool integration challenges, and internal silos remains a significant challenge for many organizations. Info-Tech's newly ...
What This Vulnerability Teaches Us About AI SecurityThe recent disclosure of EchoLeak by Aim Labs marks a significant milestone in AI security research. As the first documented zero-click exploit ...
A panel of cybersecurity experts took to the stage at Tech & AI LIVE London to examine how organisations should rethink their defence strategies in the face of rapidly evolving threats. Hosted on the ...
Microsoft has updated its threat actor reference guide with a list of common hacking groups tracked by CrowdStrike and Redmond, all mapped using each company's naming systems.
CrowdStrike (NASDAQ: CRWD) and Microsoft today announced a collaboration to bring clarity and coordination to how cyber threat actors are identified and trac ...
CrowdStrike (NASDAQ: CRWD) and Microsoft today announced a collaboration to bring clarity and coordination to how cyber threat actors are identified and tracked across security vendors.
In a move aimed at strengthening Europe’s cybersecurity landscape and digital sovereignty, Microsoft has set out a new strategy grounded in trust, legal resilience and AI innovation. The technology ...
Global cyber security company AlgoSec has published its annual report The State of Network Security Report, which provides an comprehensive analysis of today’s network security landscape. It does this ...