Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Investor Serhiy Tokarev announces a new intake for the Generation H programme

This year, the Generation H accelerator programme, launched by SET University in partnership with the Tokarev Foundation, has gone global. In addition to teams from Ukraine, startups and founders from other countries can now participate.

CyberPhysical Security: Protecting the Modern EV Charging Perimeter

Electric vehicles have crossed from niche technology into mainstream infrastructure. Charging networks now form a critical layer of both the energy grid and the transportation system, and attackers have noticed. EV charging sits at a three-way intersection of cloud software, operational technology, and automotive systems. Each domain has its own threat model, its own tooling, and its own team assuming someone else owns the risk. That gap is where adversaries operate.

How to Protect Your Enterprise from High-Stakes Business Litigation

High-stakes litigation can drain a company's resources and focus. Protecting an enterprise requires a proactive approach to risk. Leaders must look ahead to spot potential legal traps before they cause damage. Safeguarding a brand is about building a wall against future threats. It allows for steady growth without constant fear of lawsuits. Small steps taken today prevent massive headaches tomorrow.

Best B2B Cross-Border Payment Solutions: Security, Compliance and Global Reach

Every international business payment creates a security surface. Data moves across borders. Sanctions screening must fire in real time. FX execution carries counterparty risk. Correspondent banking chains introduce opacity at every hop. The platforms businesses choose to move money internationally are, in a meaningful sense, a security decision as much as a financial one.

GitProtect Report: DevOps Incidents Rise by 21%, While Impact Hours Double to 9,255

With 607 recorded incidents, DevOps platforms experienced a 21% year-over-year increase, while total disruption time nearly doubled to 9,255 hours in 2025. This marks a clear rise in both the frequency and severity of outages compared to the previous year, according to the latest GitProtect Report.

10 top ITDR tools for identity-centric security in 2026

Identity threat detection and response (ITDR) tools close the visibility gap that EDR and MFA leave open. They surface credential misuse, lateral movement, and Active Directory activity that appears legitimate to endpoint and perimeter defenses. The right fit depends on your identity infrastructure, detection depth, and whether you need real-time blocking or post-event response.

Cato CTRL Threat Research: New Vulnerabilities in NVIDIA NeMo and Meta PyTorch Enable Full System Compromise

Cato CTRL has discovered high-severity vulnerabilities in NVIDIA NeMo (CVE-2025-33236 with a CVSS score of 7.8) and Meta PyTorch that turns AI model files into remote code execution (RCE) vectors. The NeMo vulnerability allows RCE by importing a malicious AI model. The NeMo framework silently executes threat actor-controlled code with no warning.

Why banks are adopting blockchain infrastructure now

Fireblocks now supports 95 banks globally, and the adoption curve is accelerating. In this clip from the Banking Bootcamp, Financial Markets Economist Neil Chopra explains what's driving the shift: regulatory clarity, proven utility, and infrastructure that plugs into how banks already operate. This is Episode 1 of the Banking Bootcamp, a three-part series produced in partnership with American Banker.

AI SOC Metrics That Actually Matter: How to Measure Whether AI Is Working in Your SOC

Every security vendor shipping an AI product in 2026 makes the same promises. Faster triage. Shorter response times. Fewer false positives. Reclaimed analyst hours. But, six months after deployment, most security leaders still cannot answer a straightforward question from the board: Is this thing actually working?