Thursday, January 8, 2026
Tag:

Cybersecurity

Data sovereignty, cloud and security [Q&A]

As more and more information is stored in the cloud, often with hyperscale providers, the issue of data sovereignty -- where the information resides...

US slaps a ban on foreign-made drones and components

Ever mindful of security, the US has announced a ban on new foreign-made drones and components key to their manufacture. The Federal Communication Commission’s...

NordProtect rolls out expanded monitoring features for identity theft detection

NordProtect, an identity theft protection service from Nord Security, has expanded its monitoring features to give users earlier notice of potential fraudulent activity. The...

AI as a target, web-based attacks and deepfakes — cybersecurity predictions for 2026

The very nature of cybersecurity makes it a constant arms race between attackers and defenders and recently that’s meant both sides utilizing AI.This seems...

Agent vs agent, reliable interfaces and value for money — artificial intelligence predictions for 2026

Artificial intelligence has been driving much of the technical agenda for the last couple of years and is still evolving rapidly, finding its way...

Adapting to AI agents, growing risks and perimeter focus — identity predictions for 2026

Identity remains key to cybersecurity with stolen IDs opening the door to many attacks. And with the rise of AI agents and machine identities...

Hospitals struggle with visibility of connected medical devices

A new survey of CISOs at North American hospitals finds that 43 percent identified complete device visibility as the challenge they would most want...

Increased workloads, strategic influence and technical focus — CISO predictions for 2026

The task of the CISO has historically been an underappreciated one. But as businesses wake up to the fact that cybersecurity issues can represent...