Business
Why identity security is a critical component of effective NIS2 compliance
"On the surface, NIS2 might seem like a daunting hurdle to overcome. But it can also be seen as an opportunity."
Business
"On the surface, NIS2 might seem like a daunting hurdle to overcome. But it can also be seen as an opportunity."
AI
Billions of bots are about to go wild on the internet, but we don't have a universally accepted way of working out if they're helpful or malicious.
Critical Infrastructure
"We can stop these threat actors - we just need the right tools, technology, and people behind the scenes to do it."
Security
The Radiant Group apologises after publishing sensitive data and images - before deleting the entire cache. Time to forgive and forget?
Critical Infrastructure
"81% of codebases contained high or critical-risk vulnerabilities - an unacceptable risk when patient safety and data integrity are paramount."
Security
Cybersecurity professionals horrified as threat actors publish pictures of innocent children and families' "sensitive" data.
Security
"From strategic investment to culture change, embedding security into an organisation's DNA starts at the top."
Security
"The abuse of a popular app demonstrates the evolving sophistication of social engineering threats in the wild."
Security
"This issue isn’t about complexity. It’s about failing to do the basics and leaving the door wide open."
Cyberwar
"Critical infrastructure faces not only unresolved weaknesses but mounting geopolitical risks."
Security
"There is no evidence any customer data has been stolen but our retail and production activities have been severely disrupted."
Security
"It’s deeply unsettling to think of a hostile stranger spying on us through the webcams and camera phones which surround us."