Security
Discover expert analysis on security with news, features and insights from the team at IT Pro.
Explore Security
-

The key risks security teams face in 2026
From AI-related flaws to supply chain risks, cyber professionals now contend with overlapping challenges
By Ross Kelly Published
-

US bans foreign-made routers over security risks
News FCC says routers can be approved for sale, but so far, none are
By Nicole Kobie Published
News -

Russian sentenced to jail for his part in ransomware attacks
News Aleksei Volkov operated as an initial access broker, helping cybercrime groups, including the Yanluowang ransomware group
By Emma Woollacott Published
News -

Observability will be key to agentic AI safety, says Microsoft Security exec
News Agentic AI adoption will require a re-evaluation of enterprise risk management, according to Microsoft corporate VP
By Ross Kelly Published
News -

Enterprises need to think of agents as ‘digital co-workers’ – and that means implementing the same security safeguards
News Practices such as zero trust and least privilege will be needed as agents gain access to sensitive enterprise data
By Ross Kelly Published
News -

Safe AI adoption rests on cybersecurity professionals, says RSAC chairman
News With AI security a key talking point at RSAC 2026, executive chairman Hugh Thompson believes the industry can lead by example
By Ross Kelly Published
News -

Dark web platforms taken down in international operation
Operation Alice traced tens of thousands of CSAM and cybercrime-as-a-service sites back to one individual
By Emma Woollacott Published
-

Stryker hackers struck by FBI in domain seizure campaign
News The domain seizures come hot on the heels of Handala's devastating attack on the medical tech firm
By Emma Woollacott Published
News -

1Password targets identity security gains with new agent platform
News The Unified Access system from 1Password will help enterprises manage AI agent access across different devices and users
By Nicole Kobie Published
News -

How does a SQL injection attack work?
In-depth Understanding one of the simplest, yet most effective, methods of cyber attack
By Adam Shepherd Last updated
In-depth -

Zero trust: how to prepare for modern threats
In-depth Meeting the demands of the latest zero trust guidelines involves ditching legacy apps and positioning for non-human identities
By Kate O'Flaherty Published
In-depth -

'AI-generated phishing became the baseline' for hackers last year
News Forget looking for typos and bad grammar, phishing campaigns are using AI to boost their attack success
By Nicole Kobie Published
News