Workday research: 75% of employees will work with artificial intelligence, but not for it

Workday research finds 75% of workers like AI as a teammate, but only 30% want AI to be the boss. Trust in the technology may grow with use, but... Read more »

What boards should look for in a CISO

The role of the chief information security officer has evolved dramatically over the years – and will continue to do so. What should boards really looking for when hiring... Read more »

ShinyHunters Salesforce cyber attacks explained: What you need to know

Computer Weekly gets under the skin of an ongoing wave of ShinyHunters cyber attacks orchestrated via social engineering against Salesforce users Read more »

How CISOs can adapt cyber strategies for the age of AI

Traditional security measures may not be able to cope with the AI reality. In order to safeguard enterprise operations, reputation and data integrity in an AI-first world, security leaders... Read more »

Watching the watchers: Is the Technical Advisory Panel a match for MI5, MI6 and GCHQ?

Dame Muffy Calder is chair of the Technical Advisory Panel (TAP), a small group of experts that advises the Investigatory Powers Commissioner on surveillance technology. Do they have what... Read more »

What is the three lines model and what is its purpose?

The three lines model is a risk management approach to help organizations identify and manage risks effectively by creating three distinct lines of defense. Read more »

OpenAI closes gap to artificial general intelligence with GPT-5

As OpenAI’s latest large language model delivers smarter AI, experts are wary of the risks GPT-5 poses to human creativity Read more »

What is integrated risk management (IRM)?

Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization’s security, risk tolerance profile and strategic decisions. Read more »

Black Hat USA: Startup breaks secrets management tools

Researchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used CyberArk Conjur and HashiCorp Vault enterprise secrets management platforms Read more »

Cyber criminals would prefer businesses don’t use Okta

Okta details a phishing campaign in which the threat actor demonstrated some unusually strong opinions on what authentication methods they would like their targets to use. Read more »
Subscribe to our Newsletter