
Janine Saintos’ portfolio of work in security, as well as her unique business perspectives, make her content a favorite of C-suite audiences. By combining her knowledge of business and security, Janine helps leaders develop an understanding of a wide range of related topics. Building cyber-resilient organizations, developing business continuity and disaster recovery plans, and cybersecurity due diligence for mergers and acquisitions are some of the themes addressed in her publications.
A bombshell government report has ignited a firestorm over the use of policing technology, revealing that the retrospective facial recognition (RFR) system deployed across the UK exhibits profound racial and gender biases, leading to urgent calls for systemic reform from the nation's leading
With a distinguished career spent on the front lines of corporate cyber defense, Malik Haidar has a unique perspective on the evolving relationship between hackers, corporations, and the law. He has seen firsthand how legal ambiguity can stifle the very research needed to protect critical systems.
As of late 2025, the grace period for compliance has conclusively ended, making the European Union's Network and Information Security 2 (NIS2) Directive an enforced reality for businesses across the continent and beyond. This landmark regulation, which officially replaced its 2016 predecessor
In an era where digital threats increasingly manifest as physical dangers and vice versa, the traditional silos separating security domains are becoming dangerously obsolete. Responding to this evolving landscape, Maguen Group, a prominent Mexican private security company with over 17 years of
Imagine a widely trusted tool, used by countless enterprises to process sensitive data, suddenly becoming a gateway for catastrophic cyber attacks. This is the alarming reality facing Apache Tika, a cornerstone framework for content detection and text extraction. With its critical vulnerability
Imagine a world where stepping into a high-security facility, a university campus, or even a hospital is as seamless as unlocking a smartphone, yet guarded by the most advanced identity verification technology available. This vision is inching closer to reality in Japan, thanks to a transformative
Imagine opening a seemingly harmless SMS on your Android device, only to unknowingly grant cybercriminals full control over your phone, bank accounts, and personal data. This isn’t a far-fetched nightmare but a chilling reality as Android malware evolves into a sophisticated threat targeting m


SecurityNews uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our Cookie Policy