The five main types are network security, application security, information security, endpoint security, and cloud security.
With major cyber-attacks accelerating and identity-based threats becoming the norm, the defensive mindset can no longer focus on a narrow group of administrators ...
In 2025, cyberattacks have continued to grow in both frequency and scale, and 2026 is unlikely to bring reprieve. Emerging technologies like agentic AI and quantum computing create new opportunities ...
TechRepublic asked cyber experts to predict the top trends that will impact the security field in 2025. The cyber landscape is more turbulent than ever. Microsoft recently reported a 2.75-fold ...
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026 ...
CISOs know cyber resilience is mission critical, but securing investment and ensuring the success of the organisation means telling a clear and compelling story ...
2025 was a wild ride for cyber security. The landscape is shifting faster than ever, and several themes stand out when I think about the most important cyber security lessons from the year.
Data compromises in the US saw a dramatic spike from 2022 to 2023, rising from 1,802 incidents to 3,205. In 2024, the Identity Theft Resource Center (ITRC) continued to track data compromises, finding ...
Despite the Department of Defense spending $14 billion a year on cyber forces and technology, U.S. military cyber forces have never met the department’s readiness standards. This decade-long failure ...
Large companies are no strangers to cyber insurance policies. In fact, 93% of companies with more than $1 billion in annual revenue have some form of cyber coverage. On the other hand, small and ...
The E.U. Cyber Resilience Act was enacted on Dec. 10. This legislation impacts all manufacturers, distributors, and tech importers that connect to other devices or networks operating in the bloc.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results