News
Why business resilience is becoming the ultimate competitive differentiator
1+ hour, 3+ min ago (1320+ words) Covering Security Across Borders Businesses are increasingly recognising that resilience, rather than checkbox compliance, is what ultimately determines long-term operational success, customer trust and competitive advantage in a rapidly evolving cyber threat landscape, says Sam Peters, Chief Product Officer, IO....
Snowflake strengthens public sector commitment with completed IRAP Protected assessment on Google Cloud
4+ hour, 43+ min ago (262+ words) Covering Security Across Borders Snowflake has strengthened its public sector credentials in Australia after completing an Infosec Registered Assessors Program assessment for its deployment in Google Cloud's Melbourne region at the PROTECTED level. Snowflake has completed an Infosec Registered Assessors…...
First Distribution strengthens cybersecurity go to market with Qualys
2+ day, 21+ hour ago (135+ words) Covering Security Across Borders First Distribution has announced a collaboration with Qualys to deliver enhanced cyber risk management and compliance solutions to partners and customers across South Africa. First Distribution is teaming up with Qualys, a leading provider of cloud-based…...
Blue Voyant strengthens cyber defence for ODEON Cinemas Group across eight countries
2+ day, 23+ hour ago (465+ words) Covering Security Across Borders Blue Voyant has partnered with ODEON Cinemas Group to modernise and unify cybersecurity operations across eight European countries, delivering 24/7 protection, rapid incident response and improved third party risk visibility. Blue Voyant has partnered with ODEON Cinemas…...
Qualys and Converge launch cyber insurance offering powered by Enterprise Tru Risk Management
1+ week, 2+ hour ago (451+ words) Intelligent CISO Qualys and Converge launch cyber insurance offering powered by Enterprise Tru Risk Management Qualys, a leading provider of cloud-based IT, security and compliance solutions, together with Converge, pioneers in advanced cyber-risk management and underwriting, has announced a joint…...
City of London Corporation plans digital identity verification network to tackle UK fraud crisis
1+ week, 3+ day ago (193+ words) Covering Security Across Borders The City of London Corporation has called for tech firms to support the construction of a digital identity verification network, improving security between banks and financial institutions in the fight against fraud. The City Corporation estimates…...
Why prevention must replace detection in modern cybersecurity
1+ week, 3+ day ago (1449+ words) Covering Security Across Borders The report describes a shift from technical exploitation to human exploitation, does this fundamentally change how organisations should think about cybersecurity? Organisations should think about a combination of technical and human exploitation. For years, cybersecurity strategies…...
World Password Day highlights urgent need for stronger identity protection against AI-driven cyberthreats
1+ week, 4+ day ago (608+ words) Covering Security Across Borders Beth Miller, Field CISO, Mimecast World Password Day is a useful moment, but the industry keeps having the wrong conversation. The question was never "are your passwords strong enough?" It"s "why do attackers keep getting…...
Researcher uncovers exposed stalkerware database targeting European celebrity
1+ week, 4+ day ago (206+ words) Intelligent CISO Researcher uncovers exposed stalkerware database targeting European celebrity A cybersecurity researcher has uncovered an exposed database containing thousands of screenshots allegedly captured through stalkerware installed on a prominent European celebrity's device. Cybersecurity researcher Jeremiah Fowler has discovered an…...
The Fortinet 2026 Global Threat Landscape Report reveals a surge in AI-enabled cybercrime
1+ week, 5+ day ago (459+ words) Covering Security Across Borders The data reveals that cybercrime no longer functions as a series of isolated campaigns " it operates as a system, with malicious hackers operating across an end-to-end life cycle and compressing the attack life cycle with shadow…...