Infosecurity News Features

AI Agents Need Security Training – Just Like Your Employees
Treat AI applications like you would any of your employees, said ISACA member Meghan Maneval

Cybersecurity M&A Roundup: CrowdStrike, SentinelOne and Check Point Invest in AI Security
AI security was the main focus for acquisitions in September, while Mitsubishi Electric unveiled a $1bn deal to buy OT security firm Nozomi Networks

Why Shadow AI Is the Next Big Governance Challenge for CISOs
Shadow AI is on the rise and security leaders must develop strategies to mitigate this risk while ensuring employees can enjoy the innovative benefits these tools have to offer

Insider Threats Surge: What CISOs Must Know to Protect Their Organizations
Insider threats are escalating and CISOs must act now to strengthen visibility, access controls and dedicated resources to defend against attacks from within

US: CISA 2015 Safe Harbor at Risk as September 2025 Deadline Nears
The deadline for the reauthorization of the US Cybersecurity Information Sharing Act is September 30

Cybersecurity M&A Roundup: New Moves Made by CrowdStrike, Accenture and Okta
August 2025 was another busy month for cybersecurity M&A announcements, including CrowdStrike revealed its intent to buy Onum

Why Addressing Legacy IT is an Urgent Strategic Priority for CISOs
Warnings about Windows 10's end-of-life date in October highlight the significant cyber risks posed by growing reliance on legacy IT

Why CISOs Should Bet on Startups in Today’s Cybersecurity Market
Cybersecurity startups are at the forefront of new technologies and tackling emerging challenges, and security leaders should consider their offerings

Cybersecurity M&A Roundup: Palo Alto Networks Agrees $25bn Deal to Acquire CyberArk
Cybersecurity giant Palo Alto Networks reached a definitive agreement to acquire identity security specialist CyberArk for $25bn

How ISO 42001 Strengthens AI Cybersecurity and Data Privacy
Learn how ISO 42001 empowers organizations to manage evolving AI risks while ensuring cybersecurity and data privacy

Unmasking the SafePay Ransomware Group
Infosecurity spoke with threat intelligence experts to uncover the tactics, victimology and business model of the emergent ransomware group SafePay

From WestJet to Qantas: The Rising Cyber Threats Impacting Major Airlines
Data extortion attacks are impacting carriers like Qantas, WestJet and Hawaiian Airlines, as the FBI issues a critical warning ahead of the busy summer travel season

Cybersecurity M&A Roundup: AI Advancements Drive Activity in June
June 2025 saw several M&A deals announced involving the acquisition of specialist AI cybersecurity solutions and services

Cybersecurity M&A Roundup: Proofpoint Makes Two Major Acquisition Announcements
In May 2025, Proofpoint made two major strategic M&A announcements, with other deals unveiled by Check Point and Fortinet

How to Incentivize Security by Design
Technology operators and vendors must be better incentivized to invest in building products and services that are secure by design

Cybersecurity M&A Roundup: Palo Alto Networks to Acquire ProtectAI
Cybersecurity giant Palo Alto Networks announced a definitive agreement to acquire ProtectAI, as it looks to develop its security offerings for AI and ML systems

How the Channel is Evolving in the Cybersecurity Sector
While the cybersecurity channel is poised for significant growth, the digital landscape is driving the channel to evolve and adapt to new challenges

How UK Firms Can Transform Cybersecurity Recruitment and Retention
UK government initiatives provide opportunities for organizations to transform their cybersecurity recruitment and retention, tackling the widening skills gap

Cybersecurity M&A Roundup: Google Agrees $32bn Wiz Acquisition
Google’s agreement to acquire Wiz was the standout M&A news from March. Other acquisition agreements were announced by SolarWinds, Armis and Forcepoint

World Backup Day: Why Backup Isn't Enough in the Age of AI and Data Exfiltration
In 2025, World Backup Day has expanded to encompass a broader range of data protection strategies







