Topic: cybersecurity preparedness

  • ASI Report: How Australian IT Leaders Achieve Growth and Resilience in 2025

    ASI Report: How Australian IT Leaders Achieve Growth and Resilience in 2025

    Australian organizations are reshaping technology strategies to balance growth and operational resilience, with leaders split between pursuing transformation initiatives and focusing on operational excellence. A significant 40% of leaders feel unprepared for cybersecurity threats, prompting a shi...

    Read More »
  • Businesses Seek AI Gains Without the Security Risks

    Businesses Seek AI Gains Without the Security Risks

    European IT experts predict AI-driven cyber threats and deepfakes will be a major concern in 2026, with organizations largely unprepared for these risks. AI is viewed as both a significant threat and a transformative opportunity, with generative AI and predictive analytics leading technology tren...

    Read More »
  • State-Sponsored Cyber-Attacks: A Top Fear for Businesses

    State-Sponsored Cyber-Attacks: A Top Fear for Businesses

    State-sponsored cyber-attacks are a top fear for cybersecurity professionals, with many citing a lack of preparedness for such threats linked to geopolitical conflict as a primary concern. Over a third of surveyed professionals feel their governments provide insufficient support, and the risk ext...

    Read More »
  • 1 in 4 UK and US Firms Hit by Data Poisoning Attacks

    1 in 4 UK and US Firms Hit by Data Poisoning Attacks

    One in four organizations in the UK and US have experienced data poisoning attacks, where malicious actors corrupt AI training data to disrupt operations or bypass security measures. Unauthorized employee use of generative AI tools, known as "shadow AI," poses risks such as data leaks and complia...

    Read More »
  • Trump's Chief of Staff Deepfaked in Phishing Scam

    Trump's Chief of Staff Deepfaked in Phishing Scam

    Each week, we round up the security and privacy news we didn't cover in depth ourselves. Despite Wiles’ reported claim of having her device hacked, it remains unconfirmed whether this was actually how attackers identified Wiles’ associates. It would also be possible to assemble such a target list from a combination of publicly available information and data sold by gray-market brokers. If so, that would make the incident one of the most significant cases yet of so-called deepfake software being ...

    Read More »