The trust deficit in CNI: How to address a growing concern
As I attend the Gartner Security & Risk Management Summit in London I have been thinking a lot about how critical national infrastructure (CNI) (or…
As I attend the Gartner Security & Risk Management Summit in London I have been thinking a lot about how critical national infrastructure (CNI) (or…
The European Court of Human Rights has condemned Turkey for jailing a teacher for downloading an encrypted messaging app that the government claimed was linked…
Worldwide user spending on security and risk management tool and projects could reach as high as $214bn (£175bn) in 2024, representing a 14.3% increase on…
Eight US politicians have written to nine leading American tech companies to demand answers about the working conditions of their data workers, who are responsible…
The spread of application-driven businesses has elevated application programming interface (API) security issues to a pressing concern, with the number of incidents arising from vulnerable…
Network attached storage (NAS) is one of the fastest-growing sectors of the data storage market. For enterprises and other large organisations, NAS provides an efficient way…
To encrypt or not to encrypt, that is the question. Well, you should of course be encrypting data in motion particularly where it’s to be…
As cyber threats increasingly focus on cloud infrastructures and providers, there’s a persistent and immediate demand for robust and reliable security measures that are both…
Almost six in 10 retailers plan to adopt artificial intelligence (AI), machine learning (ML) and computer vision (CV) technologies within the next year, according to…
Digital media firm Yahoo has launched a public, crowdsourced bug bounty programme through ethical hacking specialist Intigriti, inviting ethical hackers to poke around its insides…
Five more subpostmaster victims of the Post Office Horizon IT scandal have had wrongful criminal convictions overturned. A total of 91 former subpostmasters and Post…
The Post Office’s primary objective was to “protect the integrity of its [IT] system” when taking subpostmasters to court over unexplained accounting shortfalls, and not…