Ping Identity, ManageEngine, Keeper Security, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of January 9th. This round-up covers announcements and…
NDSS 2025 – EMIRIS: Eavesdropping On Iris Information Via Electromagnetic Side Channel
Session 8B: Electromagnetic Attacks Authors, Creators & Presenters: Wenhao Li (Shandong University), Jiahao Wang (Shandong University), Guoming Zhang (Shandong University), Yanni Yang (Shandong University), Riccardo Spolaor (Shandong University), Xiuzhen Cheng…
Policy Corner: Information Security and Privacy
As we shift our attention to information security and privacy policies, consider the following scenario where a well-intentioned community event exposed how easily gaps in data-handling practices can put patrons…
The cyber threats of 2026
Like every other technological domain, the cyber threat landscape of 2025 could not escape the gravitational pull of AI. In 2026, however, artificial intelligence is expected to move from buzzword…
Knownsec Data Breach: A Trove of Espionage Tradecraft with an Insider Narrative
Introduction The Knownsec leak is a pivotal incident of 2025 because it exposed the inner workings of a major state-linked Chinese cybersecurity firm, revealed espionage tools and global targets, internal…
How 2025 Redefined Federal Cyber Strategy
Cybersecurity leaders entered 2026 with a clearer view of how artificial intelligence-driven threats, operational technology risk and hybrid infrastructure reshaped security decisions in 2025. Drawing on a global survey of…
