Global Breach Costs Fall to $4.44m as AI Security Matures: IBM

IBM’s Cost of a Data Breach Report 2025 reveals faster detection offsets rising AI-driven attacks, though US breach costs hit a record high.

Discover more

Databricks Expands Open Data Sharing With Iceberg Interoperability

Databricks opens up Delta Sharing to include Iceberg consumers and external catalogs, reducing friction in enterprise data exchange.

Discover more

NVIDIA Report Finds AI Deployment and Spend Accelerating Across Financial Services

NVIDIA’s 2025 State of AI in Financial Services report details higher AI adoption, measurable ROI, and growing investment in open source and agentic AI.

Discover more

Building Enterprise AI Security: From Guardrails to Governance

Experts discuss the practical steps organizations must take to secure AI, protect data, and operationalize responsible deployments.

Discover more

Socket Launches Campaign-Level Intelligence with Threat Intel

Tracking helps teams quickly assess exposure and prioritize response across evolving supply chain threats.

Discover more

Cycode Introduces Context Intelligence Graph to Power AI-Native App Security

A new graph layer aims to unify AppSec, supply chain security, and posture management around shared context and decision history.

Discover more

HiddenLayer Releases v25.12 of AI Security Console

Update introduces workflow-aligned modules, unified dashboard, and operational enhancements.

Discover more

Regulators Scrutinize Grok as Deepfake Enforcement Reaches Generative AI Systems

UK, EU, and US authorities investigate Grok deepfakes, testing how existing safety laws apply to generative AI platforms and their operators.

Discover more
01
04
Latest posts
NVIDIA Delivers DGX Spark AI Supercomputer to SpaceX's Elon Musk
NVIDIA Delivers DGX Spark AI Supercomputer to SpaceX's Elon Musk

Petaflop-Performance System Brings Supercomputer Capabilities Beyond Data Centre in Compact 1.2kg Form Factor

by Stewart Tinson
The Hidden Vulnerabilities in Modern Supply Chain Management
The Hidden Vulnerabilities in Modern Supply Chain Management

Major corporations still rely on spreadsheets to track thousands of vendors, creating security blind spots. Breaches like Target's began with minor oversights in supply chains.

by Stewart Tinson
NVIDIA Leads US Coalition to Develop AI-Native 6G Wireless Networks
NVIDIA Leads US Coalition to Develop AI-Native 6G Wireless Networks

AI-WIN project aims to restore American global leadership in telecommunications infrastructure through accelerated computing foundation

by AI-360
From Classrooms to Campuses: How UK Education is Learning to Live with AI
From Classrooms to Campuses: How UK Education is Learning to Live with AI

Public education is cautiously embracing artificial intelligence — balancing innovation with integrity.

by Stewart Tinson
Google Launches AI-Powered CodeMender Agent to Automate Vulnerability Patching
Google Launches AI-Powered CodeMender Agent to Automate Vulnerability Patching

Tech giant expands security framework with autonomous code repair tool, dedicated AI vulnerability programme, and updated agent security protocols

by AI-360
AI as a Double-Edged Sword in Cybersecurity
AI as a Double-Edged Sword in Cybersecurity

AI offers supply chain risk management possibilities but threat actors leverage the same capabilities for large-scale attacks at unprecedented speed

by Stewart Tinson
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.