#Infosec2025: Ransomware Victims Urged to Engage to Take Back Control

#Infosec2025: Ransomware Victims Urged to Engage to Take Back Control

Opening lines of communication with ransomware actors is the best way to deliver a positive outcome from an event that will be “the worst day of the IT team’s lives,” a leading negotiator has claimed.  Dan Saunders, director of incident response EMEA at Kivu Consulting, revealed that just 30% of the firm’s negotiations with threat actors over the past year have actually led to the victim paying.  “There’s a common misconception around engaging threat actors…

Read More

#Infosec2025: Know Your Audience to Make an Impact, CISOs Warn

#Infosec2025: Know Your Audience to Make an Impact, CISOs Warn

Security leaders must focus and adapt their message to their audience if they are to successfully use risk management to tame a chaotic cyber landscape, a panel of CISOs has argued. On the final day of Infosecurity Europe, security bosses from across LexisNexis and RX Global discussed how CISOs play a vital role as business enablers, and “translators” of risk for senior leadership.  This role has added importance given a landscape in which AI-driven threats,…

Read More

Threat Actors Weaponizing Hardware Devices to Exploit Fortified Enviro

Threat Actors Weaponizing Hardware Devices to Exploit Fortified Enviro

Threat actors are weaponizing legitimate hardware devices to compromise even the most fortified targets, warned Bentsi Benatar, CMO and Co-Founder of Sepio during a talk at Infosecurity Europe 2025. Despite a lack of reporting of such incidents, this approach is being utilized by sophisticated nation-state and financially motivated attackers to target sensitive targets such as banks and energy carriers. This attack vector involves a hardware device being smuggled into an organization and connected to the…

Read More

Autonomous and credentialed: AI agents are the next cloud risk

Autonomous and credentialed: AI agents are the next cloud risk

In April, Anthropic’s CISO made an eye-opening prediction: within the next year, AI-powered virtual employees with corporate credentials will begin operating across the enterprise. These agents won’t just support workflows — they’ll become part of the workforce. The business case is obvious: AI agents promise scalable automation, reduced overhead, and tireless productivity. Salesforce is already making this a reality, recently introducing AI “digital teammates.” AI agent deployments are expected to grow 327% during the next…

Read More

#Infosec2025: Defenders and Attackers are Locked in an AI Arms Race

#Infosec2025: Defenders and Attackers are Locked in an AI Arms Race

Malicious actors are using AI tools to fine-tune cyber-attacks, even as governments race to encourage AI investment. National programs to bolster AI expertise and R&D should be seen in the context of the growing use of AI tools by criminal hackers, advised Brett Taylor, UK sales engineering director at SentinelOne, in his talk at Infosecurity Europe 2025. Just as enterprises and public-sector bodies are looking to AI to improve productivity and drive economic growth, so…

Read More

How AI is helping PwC clients comply with European Union sustainability regulations

How AI is helping PwC clients comply with European Union sustainability regulations

The need to combat global warming is leading to stricter governmental regulations and increased consumer demand for businesses to adopt environmentally friendly strategies and deliver sustainable products. That’s especially true in Europe. What does that mean for your company? If you’re planning to do business anywhere in the European Union (EU), you may have to deal with the Corporate Sustainability Reporting Directive (CSRD) and associated European Sustainability Reporting Standards (ESRS). Those regulations require certain companies…

Read More

Behind the cloud reset: What CIOs are learning from real world deployments

Behind the cloud reset: What CIOs are learning from real world deployments

The enterprise cloud narrative is undergoing a fundamental shift. After years of public cloud evangelism, IT leaders are orchestrating what Broadcom’s latest research aptly terms a “cloud reset”—a strategic recalibration that positions private cloud as tomorrow’s strategic imperative. The numbers tell a compelling story. According to Broadcom’s inaugural “Private Cloud Outlook 2025: The Cloud Reset” report, which surveyed 1,800 senior IT decision-makers globally, 93% of enterprises now balance a hybrid mix of private and public…

Read More

Seven Steps to Building a Mature Vulnerability Management Program

Seven Steps to Building a Mature Vulnerability Management Program

For the past two years, cybersecurity teams have been facing an explosion of publicly reported vulnerabilities in software and hardware products, making it increasingly challenging to prioritize patch management. Speaking at Infosecurity Europe 2025, Jon Ridyard, Senior Sales Engineer at Axonius, proposed seven best practices for building mature vulnerability management processes and avoiding burnout. 1. Process: Incorporate CTEM Concepts According to Ridyard, vulnerability management should not be seen as a program, as it would imply…

Read More

The ROI of AI: Why impact > hype

The ROI of AI: Why impact > hype

“Don’t start with what AI can do. Start with what your business needs to do better.”  That quote captures the most important lesson I’ve learned from working closely with dozens of organizations implementing AI. While the headlines obsess over the latest breakthroughs in generative AI or agent-based models, the real question executives should be asking is: How will this help us solve the problems that matter most to our business? We’re at a turning point….

Read More
1 15 16 17 18 19 2,812