Page 4


  • Male IT Server Technician Specialist Holds Laptop and Looking on Raining Script Code in Rack Sever Cabinet.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs view hybrid environments as best way to manage risk, compliance

    Security leaders are also focused on the convergence of IT and operational technology as business continuity becomes a major concern.

    Updated Dec. 15, 2025
  • A black office chair is pushed against a conference table in meeting room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity concerns are paramount among executives in almost all roles, regions and industries

    A new survey finds widespread agreement that security is one of the biggest challenges facing companies today.

  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React issues new patches after security researchers flag additional flaws

    Researchers warn that critical infrastructure providers and government sites are being targeted by state-linked attackers.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates cybersecurity benchmarks for critical infrastructure organizations

    The agency streamlines and supplements goals it first issued in 2022.

  • A utility-scale battery storage system seen from above
    Image attribution tooltip
    Courtesy of Georgia Power
    Image attribution tooltip

    Grid-scale battery energy storage systems face heightened risk of cyberattack

    Experts warn that state-linked threat groups are actively searching for ways to disrupt the industry amid growing power demand in the U.S.

  • Pools of water are seen in an aerial photo of a wastewater treatment plant
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Pro-Russia hacktivists launching attacks that could damage OT

    The U.S. and its allies warned that defenders should take the hackers seriously, despite the attackers’ pattern of exaggerating their actual impact.