73% are investing in AI-specific security tools with either new or existing budgets. Malware remains top attack type since 2021; phishing rises to second, ransomware drops to third. 60% identified ...
Commvault is incorporating post-quantum cryptography to address future data security risks. Data protection provider Commvault announced earlier this month that it is adding more quantum-safe ...
2025 saw a range of activity at the intersection of privacy, data security, and national security, including new types of threats, significant U.S. regulatory actions by multiple agencies, legislative ...
Thales surveyed more than 3,000 IT experts about Generative AI The researchers found plenty of concern about security Despite the worries, businesses are accelerating adoption Despite seeing it as a ...
Sarah Ference, CPA, an author of the JofA’s Professional Liability Spotlight column, returns to the JofA podcast to discuss recent column topics and the advice CPAs can gain from them. In particular, ...
Globally, the average cost of a data breach reached $4.88 million in 2024. Yet many organizations still struggle to use threat intelligence in a way that meaningfully improves their cybersecurity ...
The death of political activist Charlie Kirk has reignited concerns about the escalating violence surrounding U.S. politics and sharpened the focus on the safety of federal lawmakers. Leaders on both ...
Cybersecurity is entering a decisive phase. In 2026, the most dangerous threats will no longer be slow, manual, or purely human-directed. They will be autonomous, adaptive, and capable of operating at ...
Quantum computers able to defeat the encryption that has long safeguarded confidential electronic data – including that of U.S. state and local governments – might be viewed as a potential threat that ...
A foreign actor infiltrated the National Nuclear Security Administration’s Kansas City National Security Campus through vulnerabilities in Microsoft’s SharePoint browser-based app, raising questions ...
This podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results