Cybersecurity Industry News
A collection of Cybersecurity latest news, analysis and best practices from top business influencers and the world's most trustworthy sources.
Five Cybersecurity Misconceptions That Could Cost Businesses Millions
Shane O'Donnell, Centric Consulting's Vice President of Cybersecurity, has two decades of experience in audit and cyber risk management. In cybersecurity, myths aren't just harmless misconceptions—they're expensive vulnerabilities disguised…
India Orders Smartphone Makers to Pre-Install Govt Cyber Security App
Bengaluru: India's telecoms ministry has privately asked smartphone makers to preload all new devices with a state-owned cyber security app that cannot be deleted, a government order showed, a move likely to antagonise Apple and privacy advocates.
Financial watchdog chief warns Korean firms underinvest in cybersecurity amid hacks
The level of investment in cybersecurity by Korean companies is far below that of other major countries, the head of the country's financial watchdog warned Monday, amid a string of recent hacking incidents at major firms, including SK Telecom…
Telecom Ministry Orders Smartphone Makers to Preload Mandatory Government-Owned Cybersecurity App
The telecom ministry has directed all major smartphone makers to pre-install the government's Sanchar Saathi cybersecurity app on every new phone sold in the country, and to ensure that users cannot remove or disable it, according to an order dated…
Butler County communities ramp up cybersecurity as global threats, breaches rise
BUTLER COUNTY, Ohio — Ohio's been on the radar screen from a cyber perspective in recent years, “and definitely not in a good way,” said Shawn Waldman, CEO of Moraine-based Secure Cyber. About 10 years ago, he said the threats…
Centre asks smartphone makers to preinstall its cybersecurity app Sanchar Saathi on phones
The Department of Telecommunications (DoT) has asked smartphone companies in India to preinstall a state-developed cybersecurity application that allows users to report fraudulent calls and messages, and stolen mobile phones, The Indian Express has…
SETU's Walton Institute to lead €5.3m EU quantum cybersecurity project
Dr Indrakshi Dey is leading a new project to protect critical digital infrastructure from emerging quantum computing threats. As cyberattacks on critical infrastructure increase in number and sophistication across Europe, a new project lead by…
Why A New CISO's First 100 Days Are The Key To Long-Term Success
JC Gaillard, Founder & CEO, Corix Partners | Global Cybersecurity Advisor & Thought Leader | Author 'The Cybersecurity Spiral of Failure.' I have written and spoken at length over the past ten years around the short tenure of Chief Information…
AI vs AI: New Cybersecurity Battlefield Where No Humans Are in the Loop
The Age of AI vs. AI cyber warfare, and machine-speed warfare is upon us as a recent attack using Anthropic's Claude showed writes Satyen K. Bordoloi In mid-September 2025, a Chinese state-sponsored hacking group, designated GTG-1002 by Anthropic…
Cybersecurity Stocks Worth Watching - November 30th
12 Analysts Just Raised CrowdStrike Targets—Here's What They See Coming Palo Alto Networks, CrowdStrike, and Fortinet are the three Cybersecurity stocks to watch today, according to MarketBeat's stock screener tool. Cybersecurity stocks are…
CrowdStrike, Amazon And Prologis On CNBC's 'Final Trades' - Global X Cybersecurity ETF (NASDAQ:BUG), Amazon.com (NASDAQ:AMZN)
On CNBC's “ Halftime Report Final Trades,” Capital Area Planning Group's Malcolm Ethridge named CrowdStrike Holdings, Inc. (NASDAQ:), which is scheduled to report quarterly earnings this week. CrowdStrike will release earnings results…
Pantami, Mujaddadi Foundations to train Bauchi youths in AI, cybersecurity - The Nation Newspaper
November 30, 2025 by Our Reporter The Professor Isa Pantami Foundation (PIP Foundation) has announced a partnership with the Mujaddadi Care Foundation to launch a new skills-development programme that will train 200 youths from Bauchi State in…
Weaponized AI Is Changing The Vulnerability Management Game. Now What?
AI is following the path of dynamite. Photo is of The Nobel's Extradynamit. Found in the collection of Nobelmuseet Stockholm. Artist: Historic Object. (Photo by Fine Art Images/Heritage Images/Getty Images) We've officially entered a new era of…
Why security needs a step change to thwart cyber attacks amid surging innovation
As enterprise digitization accelerates to drive growth and meet customer expectations, it's vital security leaders have the right tools and strategies to keep businesses secure. Take AI innovation for example. While its transformative impact is…
The EU Space Act: a call for true strategic fairness
Before we start, a caveat: The following opinion is only relevant in a situation where the EU, together with its member states, would eventually decide to invest enough to equip itself with space capabilities commensurate with Europe's economic…
Receive a Daily briefing on Cybersecurity Industry News
Get Started