Cyber Resilience Act (CRA) stories
Anthropic limits Claude Mythos over AI hacking fears
Last week
#
devops
#
encryption
#
cloud security
Anthropic limits Claude Mythos to critical users after it exposed browser and Linux flaws, stoking fears of AI-driven cyber risk for banks.
Cyber rules shift as geopolitics & AI reshape policy
This month
#
data protection
#
digital transformation
#
cloud security
NCC Group says geopolitics, digital sovereignty and AI are driving tougher cyber rules, with boards facing greater accountability and scrutiny.
Cloudsmith survey finds SBOM gaps before cyber law
This month
#
devops
#
cloud security
#
application security
Cloudsmith survey finds most engineering teams still lack automated SBOM checks, leaving many unready for fast EU Cyber Resilience Act audits.
2N urges tougher cyber rules for access control devices
This month
#
edutech
#
data protection
#
hyperscale
2N calls for tougher cyber rules on access control, urging stronger vulnerability reporting, tighter component sourcing and longer support lifecycles.
Red Hat survey finds cloud security incidents rife
Last month
#
data protection
#
digital transformation
#
cloud security
Red Hat survey finds 97% of organisations hit by cloud-native security incidents, forcing delays, higher costs and loss of customer trust.
Red Hat finds cloud security incidents hit 97% of firms
Last month
#
data protection
#
hybrid cloud
#
cloud security
Red Hat reports 97% of organisations suffered cloud-native security incidents last year, exposing basic failings in configuration and governance.
Cloudsmith adds controls to block risky dependencies
Last month
#
devops
#
cloud security
#
application security
Cloudsmith adds automated controls to quarantine and block risky dependencies, tightening enforcement on software supply chain security.
Keysight unveils SBOM Manager to meet new cyber rules
Last month
#
application security
#
physical security
#
devsecops
Keysight debuts SBOM Manager to automate software bills of materials as EU and US cyber rules tighten transparency and compliance demands.
Open source dependencies leave apps dangerously exposed
Last month
#
uc
#
digital transformation
#
application security
Secure.com warns most apps hide critical flaws in open source components, as unpatched dependencies and licence risks leave firms exposed.
Ransomware dominates UK cyber incidents, data loss surges
Last month
#
data protection
#
ransomware
#
phishing
Ransomware drives over half of UK cyber incidents as data loss surges, with healthcare, retail and complex supply chains hardest hit.
NCC warns of rising cyber risks to connected farming
Last month
#
agricultural technology
#
ransomware
#
cloud security
NCC warns that insecure connected farm machinery could let cyber attacks disrupt harvests, cut yields and threaten food supply chains.
Channel partners to adopt strategic roles amid AI & security shifts
Fri, 5th Dec 2025
#
firewalls
#
network security
#
iot security
In 2026, IT channel partners will shift towards strategic advisory roles, guiding clients on AI adoption, integrated security, and OT compliance amid evolving demands.