A patent practice leader’s guide to the AI revolution

Brett Krueger of Honigman LLP discusses the use and transformative potential of AI in patent practice and the importance of proactive and strategic leadership.

Thales: AI and quantum threats top security agendas

According to Thales, AI and quantum threats have catapulted to the top of the worry list for organisations wrestling with data security.

217 Today: As Illinois lawmakers weigh artificial intelligence rules for schools, here’s how Rockford teachers

In today's deep dive, we'll learn why Illinois lawmakers are considering a measure that would create an advisory board to give schools guidance on how to use artificial intelligence.

How Nailing Basic Cyber Hygiene Makes an Organization Stronger

This article argues that by prioritizing cyber hygiene—patching systems, training staff, and consolidating tools—organizations can build stronger defenses and free up resources to tackle more sophisticated threats when they do arise.

How Nailing Basic Cyber Hygiene Makes an Organization Stronger

This article argues that by prioritizing cyber hygiene—patching systems, training staff, and consolidating tools—organizations can build stronger defenses and free up resources to tackle more sophisticated threats when they do arise.

Arctic Wolf 2025 Trends Report Reveals AI is Now the Leading Cybersecurity Concern for Security

AI surpasses ransomware as the top concern, as organizations navigate the double-edged sword of innovation and risk.EDEN PRAIRIE, Minn., May 20, 2025 (GLOBE NEWSWIRE) -- Arctic Wolf®, a global leader in security operations, today published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior

Arctic Wolf 2025 Trends Report Reveals AI is Now the Leading Cybersecurity Concern for Security

AI surpasses ransomware as the top concern, as organizations navigate the double-edged sword of innovation and risk.EDEN PRAIRIE, Minn., May 20, 2025 (GLOBE NEWSWIRE) -- Arctic Wolf®, a global leader in security operations, today published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior

Keeper Security Appoints Shane Barney as Chief Information Security Officer

/PRNewswire/ -- Keeper Security, the leading cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting...

The Crowded Battle: Key Insights from the 2025 State of Pentesting Report

Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the rise of software testing.

Unpacking Russia’s cyber nesting doll

The latest report in the Atlantic Council’s Russia Tomorrow series explores Russia’s wartime cyber operations and broader cyber web.

Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization

China-Linked Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization

Intruder vs. Pentest Tools vs. Attaxion: Selecting The Right Security Tool

Small security teams have to choose between VM, pentesting, and EASM. We compare Intruder, Pentest Tools, and Attaxion — tools that represent each approach.