2nd Edition

Tracking the trends and news for IT and IT Security

  • Twitter
  • Security Strategy News

    SonicWall ransomware attacks offer an M&A lesson for CSOs

    SonicWall ransomware attacks offer an M&A lesson for CSOs>CSO Online – Howard SolomonThe recent report from ReliaQuest highlights the connection between ransomware attacks and vulnerabilities […]

    January 11, 2026

    Paul Davis

  • Security Strategy News

    GSMA Study Highlights Rising Cybersecurity Costs for Mobile Operators and Calls for Smarter Regu…

    GSMA Study Highlights Rising Cybersecurity Costs for Mobile Operators and Calls for Smarter Regu…>Tech Africa News – The GSMA’s recent study reveals that mobile operators […]

    January 11, 2026

    Paul Davis

  • Security Strategy News

    Cybercrime Set To Become Fully Industrialised In 2026

    Cybercrime Set To Become Fully Industrialised In 2026>Business Today – Trend Micro warns that by 2026, cybercrime will become fully automated, heavily influenced by AI […]

    January 11, 2026

    Paul Davis

  • Security Strategy News

    DORA Compliance: EU Firms Scramble for Source Code Access – 4% Prepared

    DORA Compliance: EU Firms Scramble for Source Code Access – 4% Prepared>MemaSita – The Digital Operational Resilience Act (Dora) is challenging European financial institutions, with […]

    January 11, 2026

    Paul Davis

  • Security Strategy News

    12 signs the CISO-CIO relationship is broken — and steps to fix it

    12 signs the CISO-CIO relationship is broken — and steps to fix it> – A strong partnership between the CISO and CIO is crucial for […]

    January 11, 2026

    Paul Davis

  • Security Strategy News

    How Responsible AI Governance Strengthens Cybersecurity Defenses

    How Responsible AI Governance Strengthens Cybersecurity DefensesSecurity Senses – The text discusses the critical role of responsible AI governance in strengthening cybersecurity defenses against escalating […]

    January 11, 2026

    Paul Davis

  • Security Strategy News

    CISO’s Expert Guide To AI Supply Chain Attacks

    CISO’s Expert Guide To AI Supply Chain Attacks>The Hacker News – AI-enabled supply chain attacks have surged significantly, showcasing growing sophistication and complexity that traditional […]

    January 11, 2026

    Paul Davis

  • Security Strategy News

    Why every CISO should demand a comprehensive Software Bill of Materials (SBOM)

    Why every CISO should demand a comprehensive Software Bill of Materials (SBOM)> – Greg SullivanThe text highlights the growing complexity of software applications and the […]

    January 11, 2026

    Paul Davis

  • Security Strategy News

    Why every CISO should demand a comprehensive Software Bill of Materials (SBOM)

    Why every CISO should demand a comprehensive Software Bill of Materials (SBOM)>Tech Radar – Software applications are typically created by integrating numerous open-source and third-party […]

    January 11, 2026

    Paul Davis

  • Security Strategy News

    The realities of CISO burnout and exhaustion

    The realities of CISO burnout and exhaustion>Cyber Scoop – Brian Harrell, David MussingtonCISOs are facing increasing mental health challenges due to a rapidly evolving cyber […]

    January 11, 2026

    Paul Davis

←Newer Posts Older Posts→

Categories


  • AI / ML
  • AIOps
  • IT/OT News
  • Open Source
  • Security Industry News
  • Security Strategy News
  • SOC News
  • Zero Trust

Recent Posts


  • Cybersecurity Threat Landscape and 2026 OutlookJanuary 11, 2026
  • Cyber Resilience and Software EscrowJanuary 11, 2026
  • AI & Humans: Making the Relationship Work – Schneier on SecurityJanuary 11, 2026
  • How AI is Streamlining the Underwriting Process for the Insurance IndustryJanuary 11, 2026

Tags


2nd Edition

Boston, USA

Pages

Links

F.A.Q.

Terms and Conditions

Support

Social

Twitter