
How the Enterprise Supply Chain Has Created a Global Attack Surface
Enterprises are increasingly exposed to cyber threats through their expanding global supplier ecosystems. Third‑ and fourth‑party vendors, cloud services, and offshore teams now form a sprawling attack surface that extends far beyond traditional network perimeters. Geopolitical tensions, such as the Ukraine conflict, have shown how distant suppliers can become indirect breach vectors. To mitigate this, organisations must shift from blanket controls to a risk‑based, tiered approach that embeds security into procurement and continuous monitoring.

Only 16% of Businesses Are Fully Compliant with NIS2 Despite 2024 Compliance Deadline
A CyberSmart survey of 670 leaders across eight European countries found that only 16% feel fully compliant with the EU’s NIS2 directive, despite the October 2024 transposition deadline having passed. Budget constraints (20%) and lack of implementation guidance (16%) are the...

Big Tech, Big Exposure: Data From Over 3.5 Million Accounts Handed to US Authorities
Proton’s new research shows Google, Apple and Meta have handed over data from over 3.5 million user accounts to U.S. authorities in the past decade, a 770 % increase since transparency reporting began. In the first half of 2025 alone, more than...

Black Duck Names Dom Glavach as CISO to Bolster Supply Chain and AI Security Push
Application security firm Black Duck has appointed Dom Glavach as its chief information security officer. Glavach arrives from CyberSN and a two‑decade tenure at defense contractor CTC, where he managed FedRAMP, DFARS and CMMC compliance and nation‑state incident response. His...

CyberASAP Secures £10m Boost as UK’s Next Wave of Cyber Innovators Take Centre Stage
Innovate UK’s CyberASAP accelerator received an additional £10 million (about $12.7 million) from the Department for Science, Innovation and Technology for the next four years. The programme, now approaching its 10‑year anniversary, has helped alumni raise roughly £47.4 million ($60 million) and launch 43...

Certes Launches V7 Platform with Quantum-Safe Encryption Across Hybrid Cloud and Edge Environments
Certes has unveiled version 7 of its Data Protection and Risk Mitigation platform, extending post‑quantum cryptography to hybrid‑cloud, edge and AI workloads. The update introduces per‑flow quantum‑safe encryption and cryptographic micro‑segmentation that can be deployed in days without rewriting legacy applications....

Keeper Security Expands PAM Browser Isolation to Support Advanced Web Browsing Workflows
Keeper Security has upgraded its Remote Browser Isolation (RBI) within KeeperPAM, adding multi‑tab browsing, full JavaScript support, and administrator‑controlled file uploads. The enhancements also extend KeeperAI‑powered session monitoring to RBI, enabling real‑time anomaly detection across privileged sessions. These changes aim...

MIWIC26: Nicole Bucala, CEO of DataBee, A Comcast Company
Nicole Bucala, CEO of DataBee—a Comcast subsidiary—was spotlighted as one of the 2026 Most Inspiring Women in Cyber. She leads a platform that converts disjointed security telemetry into clean, analytics‑ready datasets, helping CISOs and GRC teams make faster, data‑driven decisions....

CultureAI Launches on Microsoft Marketplace to Accelerate Secure AI Adoption
CultureAI announced its platform is now available on the Microsoft Marketplace, streamlining discovery, procurement, and deployment of AI usage‑control solutions. The listing leverages the Marketplace’s unified storefront, allowing enterprises to integrate the technology directly into existing Microsoft environments. CultureAI’s offering...

Proton Launches Encrypted Video Conferencing and Unified Workspace to Take On Google and Microsoft
Proton announced the launch of Proton Workspace and Proton Meet, expanding its privacy‑first portfolio into the enterprise productivity arena and directly challenging Google Workspace and Microsoft 365. The new video‑conferencing service offers end‑to‑end encryption via the open MLS protocol, allowing...

World Back Up Day 2026 – What Are the Takeaways?
World Backup Day 2026 highlighted that backups alone no longer guarantee security. Experts from WatchGuard, KnowBe4, and Keeper urged organizations to move beyond storage and implement fully tested, recovery‑focused resilience plans. The discussion emphasized that data loss is inevitable, ransomware...

MIWIC26: Dr Catherine Knibbs, Founder and CEO of Children and Tech
Dr. Catherine Knibbs, founder and CEO of Children and Tech, was named one of the 2026 Top 20 women in cyber by the Most Inspiring Women in Cyber Awards. Her work bridges cyber‑trauma, child protection, privacy and data security, creating frameworks...

Huntress Brings ITDR to Google Workspace as Identity Attacks Surge
Huntress announced the extension of its Managed Identity Threat Detection and Response (ITDR) solution to Google Workspace at RSA Conference, joining its existing coverage of Microsoft 365. The company now protects more than 10 million Microsoft 365 identities across 93,000 organizations,...

Routers Replace PCs as Primary Threat Vector in Evolving Device Risk Landscape
Forescout’s 2026 Riskiest Connected Devices report shows routers have overtaken PCs as the top enterprise threat vector, accounting for roughly one‑third of critical vulnerabilities. On average, routers and switches now expose about 32 flaws each, and 75% of the riskiest...

Black Duck Launches Signal to Tackle the Security Risks of AI-Generated Code
Black Duck announced the general availability of Black Duck Signal, an AI‑driven application security platform built to protect code generated by AI coding assistants. Unlike traditional rule‑based AST tools, Signal employs a suite of specialized AI agents powered by the...