Skip to content
Friday, January 23, 2026
The TechBriefs
  • Home
  • Technology
  • AI
  • Computers
  • Security
  • Internet
  • Press Releases
    • GlobeNewswire
    • PRNewswire
  • Contact

Category: cybersecurity

  • Home
  • cybersecurity
  • Page 7
Mobile security gaps revealed by BYOD and hybrid work
  • Article
  • BYOD
  • cybersecurity
  • Hybrid work
  • Mobile
  • Technology
  • Zero Trust

Mobile security gaps revealed by BYOD and hybrid work

  • 0

Organizations face massive mobile security vulnerabilities as they increasingly embrace BYOD and hybrid strategies. At the same time traditional mobile […]

File-sharing platforms not protecting against malicious content
  • Article
  • Cloud
  • Cloud security
  • cybersecurity
  • File Sharing
  • online safety act
  • Technology
  • virus

File-sharing platforms not protecting against malicious content

  • 0

Cybersecurity company Surfshark has reviewed popular file-sharing platforms and finds that the majority of them don’t scan your files for […]

Rapid adoption of agentic AI runs ahead of security readiness
  • agentic AI
  • Article
  • Artificial Intelligence (AI)
  • cybersecurity
  • Enterprise
  • Technology

Rapid adoption of agentic AI runs ahead of security readiness

  • 0

New research finds just two percent of organizations with 500+ employees report having no plans or interest in agentic AI. […]

88 percent of organizations worried about state-sponsored cyberattacks
  • Article
  • cyberattacks
  • cybersecurity
  • nation-state attacks
  • Technology

88 percent of organizations worried about state-sponsored cyberattacks

  • 0

A growing sense of unease is gripping boardrooms as 88 percent of cybersecurity and information security leaders surveyed at UK […]

Sumo brings agentic AI to cybersecurity investigations
  • agentic AI
  • Article
  • Artificial Intelligence (AI)
  • cybersecurity
  • Sumo Logic
  • Technology

Sumo brings agentic AI to cybersecurity investigations

  • 0

Modern security operations centers (SOCs) face a perfect storm of complexity: growing alert volumes, fragmented tools, and pressure to respond […]

Why offensive security is the future of cybersecurity [Q&A]
  • Article
  • compliance regulations
  • cybersecurity
  • Offensive Security
  • Q&A
  • Technology
  • Threat intelligence

Why offensive security is the future of cybersecurity [Q&A]

  • 0

In an era where cyber threats are evolving faster than ever, organizations can no longer rely solely on reactive defences. […]

Brit’s fear privacy breaches despite Online Safety Act
  • Article
  • cybersecurity
  • Phishing
  • Privacy
  • Technology
  • UK Online Safety Act

Brit’s fear privacy breaches despite Online Safety Act

  • 0

Although the UK’s Online Safety Act has made significant strides in holding online platforms accountable for harmful content, new research […]

How biometrics are reshaping authentication [Q&A]
  • Article
  • authentication
  • Biometrics
  • cybersecurity
  • Finance
  • Q&A
  • Technology

How biometrics are reshaping authentication [Q&A]

  • 0

The death of the password has been predicted for a very long time, though other methods are now gaining significant […]

The invisible attack that could be stealing your payment details while you shop
  • Article
  • cybersecurity
  • eCommerce
  • fraud
  • Payment Security
  • Shopping
  • Technology

The invisible attack that could be stealing your payment details while you shop

  • 0

Experts from NordVPN are warning about a rise in ‘invisible’ attacks that can steal payment details on legitimate eCommerce sites. […]

KEV catalog missing 88 percent of exploits
  • Article
  • CISA
  • cybersecurity
  • Open Source
  • Technology
  • vulnerabilities

KEV catalog missing 88 percent of exploits

  • 0

New research from Miggo Security suggests that CISA’s Known Exploited Vulnerabilities (KEV) catalog now reflects only a small slice of […]

Posts pagination

Previous 1 … 6 7 8 … 49 Next
  • Privacy Policy
  • Terms of use
Theme: Terminal News By Adore Themes.