8
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
What’s Hot on Infosecurity Magazine?
Cyber-Attack Contributes to Huge Sales Drop at JLR
News
1
Ransomware Group “Trinity of Chaos” Launches Data Leak Site
News
2
Bybit Theft Drives Record-Breaking $2bn Haul for North Korea
News
3
Qilin Ransomware Gang Claims Asahi Cyber-Attack
News
4
Met Police Arrest Two Teens in Connection with Kido Attack
News
5
Europol Calls for Stronger Data Laws to Combat Cybercrime
News
6
Scanning of Palo Alto Portals Surges 500%
News
1
AI Tops Cybersecurity Investment Priorities, PwC Finds
News
2
Ransomware Group “Trinity of Chaos” Launches Data Leak Site
News
3
Hackers Target Unpatched Flaws in Oracle E-Business Suite
News
4
WestJet Data Breach Impacts 1.2 Million Customers
News
5
Free VPN Apps Found Riddled With Security Flaws
News
6
Mastering Identity and Access for Non-Human Cloud Entities
Webinar
1
The Invisible Frontline: Proactive Approaches to Browser Defense
Webinar
2
Predicting and Prioritizing Cyber Attacks Using Threat Intelligence
Webinar
3
Strategic AI in Cyber Defense: How to Stay Ahead Without Increasing Risk
Webinar
4
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
5
Cybersecurity Employment: Making Sense of Conflicting Messaging
Webinar
6
Why Shadow AI Is the Next Big Governance Challenge for CISOs
News Feature
1
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
2
ING’s CISO on How Emerging Tech and Regulations are Reshaping Cybersecurity in Finance
Interview
3
How Security Teams Can Manage Agentic AI Risks
Opinion
4
NCSC: Patch Critical Oracle EBS Bug Now
News
5
Free VPN Apps Found Riddled With Security Flaws
News
6
You Might Be Interested In
- Q&A: Ciaran Martin – Infosecurity Magazine
- #Irisscon: Ireland Faced 43,000 Incidents So Far in 2019
- Cloud Security Firm iboss Appoints Matt Hartley as Chief Revenue Officer
- Google Unifies Recent Acquisitions Under New Cloud Security Offering
- Researchers Note 16.7% Increase in Automated Scanning Activity
- Security Operations Centres and the Cloud – why Company-to-Company Collaboration is Key to Success