News

If organisations don’t have a live picture of their digital environment, then they are already vulnerable.  By Dan Jones ...
Decommissioned nuclear sites need to be treated with the same level of security rigour as operational ones. By James Neilson ...
N. Korean hackers blend social engineering, novel persistence mechanisms & cross-platform coding to infiltrate their targets.
A third-party customer service platform was breached, exposing names, email addresses, phone numbers, dates of birth, and Frequent Flyer numbers.
Discover the key cybersecurity steps needed to protect our growing renewable energy infrastructure—and why they matter. Matthias Kohler ...
By embedding security into DevOps processes, organisations can reduce risk, maintain compliance & build digital services.
US legislators want to block Chinese AI systems like DeepSeek, over risks to national security and data privacy.
Ransomware Strike Hits Radix. A breach by the Sarcoma ransomware group has leaked 1.3TB of data, raising concerns over government security.
CCaS: Unified cloud communications bring together multiple tools on a single platform, enabling seamless, real-time collaboration from anywhere.
A breach in connected devices or automated decision-making have risky consequences. Q&A with Dr Francesca Boem ...
The future of AI infrastructure lies in high-throughput, low-latency storage systems built around object storage paradigms. By Paul Speciale ...
Iranian hackers are reported to have hit US banks, defense contractors and oil industry companies after the US attacks on Iranian nuclear facilities.