The government has largely removed data localisation requirements for technology companies from the Personal Data Protection ...
Information Technology experts have projected that the deployment of artificial intelligence (AI) will move beyond pilot ...
In early December 2025, western Washington was struck by a series of powerful atmospheric rivers, bringing historic rainfall, ...
State-sponsored cyberthreats, like the Volt Typhoon campaign attributed to China, have reinforced a harsh reality: Utility companies and critical ...
The global critical infrastructure protection market has been witnessing steady growth due to increasing threats to vital infrastructure and the rising need for integrated security solutions. In 2025, ...
Submarine cables have revalued their status as critical infrastructure. Ensuring their integrity, both physical and cyber, is a major challenge. Between 95 and 99% of the world’s data traffic travels ...
Federal agencies and their industry counterparts are moving at a breakneck pace to modernize in this fast-changing digital world. Artificial intelligence, automation, behavioral analytics, and ...
Every day, Americans rely on critical infrastructure to power our daily lives whether we realize it or not. From the energy that heats our homes and keeps the lights on, to the water that we drink, ...
The UK's energy security remained in the spotlight on Thursday, with Armed Forces Minister Alistair Carns admitting that protection of the country's critical infrastructure lacks a centralised ...
The convergence of IT and OT settings has opened up a new risk frontier, as older industrial systems that were never meant for connection now interact directly with the digital world. Many of these ...
The U.S. infrastructure landscape is vast and complex: roughly 85% of the critical infrastructure in the country is owned and operated by the private sector, while the public sector provides ...
The Deputy CISO blog series is where Microsoft Deputy Chief Information Security Officers (CISOs) share their thoughts on what is most important in their respective domains. In this series, you will ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results