This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
OT can be at the heart of critical infrastructure, meaning disruption could cause major problems and even endanger people. According to research by Palo Alto, three-quarters of industrial organisations globally have detected malicious cyber activity in their OT environments. These security benefits are important for two reasons.
These advancements offer immense economic growth and innovation potential, but they also introduce new cybersecurity challenges. Malik noted that 5G has been in the GCC for more than five years, enabling both carriers and industry customers to explore the possibilities of a truly digital world.
Analyst reaction to Thursday’s release by the US Department of Homeland Security (DHS) of a framework designed to ensure safe and secure deployment of AI in critical infrastructure is decidedly mixed. Where did it come from?
With rapid digitization across various sectors and an increasing reliance on digital infrastructure, the country has witnessed a parallel rise in cybersecurity threats. One of the recurring themes among security leaders is the importance of adaptability in the face of evolving cyber threats.
Security researchers are warning of a significant global rise in Chinese cyber espionage activity against organizations in every industry. It is highly likely that these investments have led to greater operational security (OPSEC) and specialization in China-linked intrusion operations, the researchers noted.
But in conflict with CEO fears, 90% of IT leaders are confident their IT infrastructure is best in class. Still, IT leaders have their own concerns: Only 39% feel their IT infrastructure is ready to manage future risks and disruptive forces. No one wants to be Blockbuster when Netflix is on the horizon, he says.
Resilient Solutions for Smarter Transportation As your city adopts Intelligent Transportation Systems (ITS) to enhance mobility and safety, securing these interconnected networks is more critical than ever. Are you inspecting and securing edge traffic between field cabinets and data centers? 3 is essential.
Be it in the energy industry, e-government services, manufacturing, or logistics, the fourth industrial revolution is having a profound impact. Put simply, it involves combining the depth of industry expertise, with the breadth of the most advanced technological offerings. Digitalization is everywhere.
Broadcom and Google Clouds continued commitment to solving our customers most pressing challenges stems from our joint goal to enable every organizations ability to digitally transform through data-powered innovation with the highly secure and cyber-resilient infrastructure, platform, industry solutions and expertise.
Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips.
With over two decades in technology and leadership roles, Sewell, whose identity has been anonymized for this article, was confident her skills and experiences would transfer but felt that her resume might not stand out for industries outside the public sector. The new resume focuses on business impact first and foremost.
Data sovereignty and the development of local cloud infrastructure will remain top priorities in the region, driven by national strategies aimed at ensuring data security and compliance. Several industries in the Middle East are set to experience significant digital transformation in the coming years.
After successive quarters of decline, venture funding to cybersecurity startups nudged up in the first quarter and could see even more investment after having the largest acquisition of a private, venture-backed company ever. Total funding to VC-backed cybersecurity startups topped $2.7 billion in Q1, per Crunchbase data.
Security researchers are warning of a significant global rise in Chinese cyber espionage activity against organizations in every industry. It is highly likely that these investments have led to greater operational security (OPSEC) and specialization in China-linked intrusion operations, the researchers noted.
What happened In CrowdStrikes own root cause analysis, the cybersecurity companys Falcon system deploys a sensor to user machines to monitor potential dangers. But, as of January 28, the companys stock price was over $400, an all-time high, helped by a perfect score on an industry test for ransomware detection. Clancy asks.
In this special edition, we’ve selected the most-read Cybersecurity Snapshot items about AI security this year. ICYMI the first time around, check out this roundup of data points, tips and trends about secure AI deployment; shadow AI; AI threat detection; AI risks; AI governance; AI cybersecurity uses — and more.
Traditionally viewed as rock-solid and steady, the insurance industry is not exactly associated with taking big risks. Others are greenlighting parallel organizations, one in charge of traditional IT needs such as security and infrastructure and another for standing up digital platforms and products.
The modern network security landscape is undergoing a rapid transformation, driven by the increasing complexity of business operations and the rise of new technologies. The distributed nature of todays work environments, fueled by cloud computing, remote work, and the Internet of Things (IoT), presents unprecedented security challenges.
This includes providing industry-leading products, transparent communication, and sophisticated tools to help to protect and fortify networks. Central to this mission is a culture of transparency and responsiveness, especially when facing a security issue. We are reporting the vulnerabilities as CVE-2025-0282 and CVE-2025-0283.
Cybersecurity firm Armis Security closed a $200 million Series D led by Alkeon Capital and General Catalyst. Industrialsecurity Armis is one of a handful of companies that plays in the industrialsecurity — also called operational technology security — and IoT security spaces.
Its exciting to see the continued momentum of 5G in transforming industries. However, the real breakthrough is in the convergence of technologies that are coming together to supercharge 5G business transformation across our most critical infrastructure, industrial businesses and governments. And we are right in the middle of it.
As enterprises scale their digital transformation journeys, they face the dual challenge of managing vast, complex datasets while maintaining agility and security. Data masking for enhanced security and privacy Data masking has emerged as a critical pillar of modern data management strategies, addressing privacy and compliance concerns.
Data protection is also integrated within the Dell AI Factory with NVIDIA, which ensures the security and recoverability of proprietary data. But some of the most forward-looking businesses across industries, from cloud service providers to production houses, are already taking advantage of the technology to reap tremendous rewards.
Data sovereignty and local cloud infrastructure will remain priorities, supported by national cloud strategies, particularly in the GCC. Cybersecurity will be critical, with AI-driven threat detection and public-private collaboration safeguarding digital assets. Cybersecurity continues to be a significant concern globally.
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider Like legacy security tools, such as traditional firewalls and signature-based antivirus software, organizations that have more traditional (and potentially more vulnerable) SOCs are struggling to keep pace with the increasing volume and sophistication of threats.
New capabilities safeguard OT remote operations, mitigate risks for critical, hard-to-patch assets, and extend protection into harsh industrial environments. As operational technology (OT) environments undergo rapid digital transformation, so do their security risks.
The growing threat posed by Agentic AI and disinformation has become one of the most critical challenges in the cybersecurity landscape. The event, hosted at the Dubai World Trade Centre, highlighted the urgent need for organizations to adapt their cybersecurity measures to address the evolving digital threats.
After more than a decade leading the digital transformation and cybersecurity initiatives of the services company, hes managed to forge a synergy where tech and informationsecurity are established as fundamental pillars for business success. From ERP evolution to Industry 4.0
The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy. Open source isnt completely free as there are still infrastructure and management costs.
Enterprise infrastructures have expanded far beyond the traditional ones focused on company-owned and -operated data centers. These include strategy consultants, systems consultants, and security consultants, among others, says Paul Farnsworth, CTO attechnology careers site Dice.
Overall, successful CIOs in 2025 will need to balance technical expertise with business acumen, leadership, and a focus on data, AI, cybersecurity, and M&A integration. AI adoption, IT outsourcing, and cybersecurity risks are fundamentally reshaping expectations. Cybersecurity is also a huge focus for many organizations.
Additionally, leveraging cloud-based solutions reduced the burden of maintaining on-premises infrastructure. For instance, AT&T launched a comprehensive reskilling initiative called “Future Ready” to train employees in emerging technologies such as cloud computing, cybersecurity, and data analytics.
In this blog, we share three challenges cybersecurity leaders say exposure management helps them solve. The core cybersecurity discipline is evolving into exposure management , which is built on a broader, more strategic approach to identifying, prioritizing and mitigating risk.
There are two main considerations associated with the fundamentals of sovereign AI: 1) Control of the algorithms and the data on the basis of which the AI is trained and developed; and 2) the sovereignty of the infrastructure on which the AI resides and operates.
Take cybersecurity, for example. A staggering 21% of organizations report a severe shortage of skilled cybersecurity professionals, with another 30% finding it difficult to find suitable candidates. Only 8% of organizations have a relatively easy time finding qualified cybersecurity experts. Contact us today to learn more.
This summer, the Federal Communications Commission (FCC) officially launched its ninth Communications Security, Reliability, and Interoperability Council (CSRIC) – a stakeholder-driven body advising the FCC on ways to ensure the security, reliability and interoperability of communications systems.
In today’s rapidly evolving technological landscape, the role of the CIO has transcended simply managing IT infrastructure to becoming a pivotal player in enabling business strategy. This process includes establishing core principles such as agility, scalability, security, and customer centricity.
Plus, OWASP is offering guidance about deepfakes and AI security. Those are three security measures cyber teams should proactively take in response to an ongoing and “large scale” email spear-phishing campaign targeting victims with malicious RDP files , according to the U.S. Cybersecurity and InfrastructureSecurity Agency (CISA).
As such, cloud security is emerging from its tumultuous teenage years into a more mature phase. The initial growing pains of rapid adoption and security challenges are giving way to more sophisticated, purpose-built security solutions. This alarming upward trend highlights the urgent need for robust cloud security measures.
Founded by Jeff Moss as a gathering that delved into the hacker mindset, to its current stature as a global industry-leading cybersecurity conference, Black Hat has been a beacon for both the establishment and underground innovators. This allows the NOC/SOC to have full visibility into the network.
This growing reliance on AI is transforming industries, especially in operational technology (OT) sectors like manufacturing and energy, where AI is a critical driver for efficiency and automation. However, it is also becoming a powerful tool for cybercriminals, raising the stakes for OT security.
Like other data-rich industries, banking, capital markets, insurance and payments firms are lucrative targets with high-value information. Conversely, threat actors – from cybercriminals to nation-states – are harnessing AI to craft more sophisticated attacks, automate their operations, and evade traditional security measures.
Tech companies still hold a competitive edge when it comes to salaries, despite mass layoffs across the industry in recent years. Despite reductions in staff, there are tech skills that continue to demand a premium salary, driving industry competition to hire talent with the right skills. 5% year over year.
1 - CISA: Hundreds of critical infrastructure orgs hit by Medusa ransomware Dont let the Medusa ransomware group turn your network into stone. government sent this week via an advisory to cybersecurity teams, especially those at critical infrastructure organizations. Thats the message the U.S.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content