Ransomware: on the murky trail of one of the leaders of Black Basta
On 20 February, every cyber threat intelligence researcher on the planet discovered a new goldmine – a document of almost...
Read more →On 20 February, every cyber threat intelligence researcher on the planet discovered a new goldmine – a document of almost...
Read more →A paper published by Microsoft, which demonstrates a radical new approach that promises to accelerate the path towards commercially viable...
Read more →Thank you for joining! Access your Pro+ Content below. 25 February 2025 Rethinking the route to net zero Share this...
Read more →The UK government has begun its search for an IT supplier to support its plan to build open banking capabilities...
Read more →The European Union (EU) has issued updated recommendations for its blueprint on cyber security crisis management and incident response, reflecting...
Read more →Europe’s cyber security landscape is undergoing profound transformation. With the Digital Operational Resilience Act (DORA) already in effect and the...
Read more →HM Revenue & Customs (HMRC) is working to fix a glitch in communications between systems that has seen self-assessment tax...
Read more →The escalating wave of cyber attacks targeting public and private sectors poses an unprecedented threat. This is readily apparent in...
Read more →When it comes to IT sustainability, the present economic uncertainty and political swings from diametrically opposite policies regarding climate change...
Read more →Apple has withdrawn from providing its UK smartphone and computer users with encrypted cloud storage following a secret government order...
Read more →Grant Thornton has issued a forensic 66-page report relating to a failed Oracle Fusion enterprise resource planning (ERP) implementation at...
Read more →The reason diversity is so important for tech teams is because difference in opinions and life experience can lead to...
Read more →