News

America’s response to China’s rise in semiconductors and artificial intelligence has been reactive, timid and structurally ...
Meet the minds behind how Microsoft prioritizes cybersecurity across every team and employee. Three deputy chief information ...
Data brokers who collect and sell data, as well as companies that engage in cross-border transactions are also expected to ...
When it comes to assessing cybersecurity performance, the truth can be found in the numbers. Here are the essential KPIs to ...
Ian Czarnezki, associate chief information officer for research infrastructure and technologies at the U of A, joined with subject matter experts to write new guidance. The public is invited to ...
On 6 May, the Department of Science, Innovation and Technology's released the AI Security Institute’s research agenda for ...
The AI Security Institute (AISI) is to prioritise research on how artificial intelligence could be used in cyber attacks, ...
Effective as of April 8, 2025, the National Security Division of the U.S. Department of Justice (DOJ) has implemented a Data Security Program ...
A leak of information on American military operations caused a major political incident in March 2025. The Security Think ...
Despite the risks associated with artificial intelligence (AI) coding, developers remain enthusiastic, using it to keep up ...
With more than two decades of SAP GRC security experience under my belt, I’ve seen firsthand how businesses work with the same issues—repetitive, error-ridden tasks that tie up valuable time, sap ...
The new guidelines remove uncertainty around security requirements for foreign operators, offering a clear framework for ...