Tuesday, January 27, 2026
Tag:

Legal

77 percent of successful email attacks impersonate trusted platforms

New research from StrongestLayer highlights a fundamental shift in attacker behavior, where adversaries increasingly hide behind business-critical platforms such as DocuSign, Microsoft, and Google...

Why keeping old customer records could cost millions [Q&A]

The modern world thrives on data, but what happens when that data has outlived its usefulness? Legacy data can become a weak link in...

AI data transparency shapes shopping behavior

A new survey of over 1,000 US consumers looks at how holiday shopping behavior is impacted by brand management of personal data in AI...

Increased workloads, strategic influence and technical focus — CISO predictions for 2026

The task of the CISO has historically been an underappreciated one. But as businesses wake up to the fact that cybersecurity issues can represent...

Don’t waste time reading T&Cs — AI can do it for you

Be honest now, do you really read T&Cs, privacy policies, etc when signing up to a service? Of course you don’t, you just scroll...

Safe cities, and computer vision: Automotus is rewriting the rules of the curb 

Among the powerful shifts that AI has brought, one unexpected transformation has largely gone under the radar. In the U.S., the historically chaotic, under-managed...

Animations used to trick users into infecting their PCs

The latest Threat Insights Report from HP Threat Research reveals how attackers are refining campaigns with professional-looking animations and purchasable malware services.The report provides...

Why Every Product Request Matters: Inside the IdeaOps Mindset

What is the cost of an idea? Are they valuable, or are they nothing before implementation? Product development management is built across ideas and hypotheses....