IAM within the framework of defence in depth
IT leaders should address their internal processes to minimise their organisations’ IT security risk exposure and attack surface. This becomes...
Read more →IT leaders should address their internal processes to minimise their organisations’ IT security risk exposure and attack surface. This becomes...
Read more →An independent inquiry into the mobile browser market has recommended that the Competition and Markets Authority (CMA) consider investigating Apple...
Read more →The Criminal Convictions Review Commission (CCRC) is reviewing cases of potential wrongful convictions where Post Office’s Capture branch software could...
Read more →Switzerland’s national postal service is targeting one million Swiss residents to join its ePost encrypted communications service by the end...
Read more →The government is “looking into” reported problems with a second Post Office IT system that was used before the controversial...
Read more →Europe is about to make its prolonged effort to create a digital single market part of a grand plan to...
Read more →Over three-quarters (77%) of business leaders claim it is easy to use the data they need for their jobs, yet...
Read more →Microsoft’s Digital Crimes Unit (DCU) has scored a major win against the cyber criminal underworld after leading an operation to...
Read more →The Australian Cyber Security Centre (ACSC) and the United States’ Cyber Security and Infrastructure Security Agency (CISA), have published updated...
Read more →The United States’ Department of Justice (DoJ) yesterday unsealed criminal charges against five individuals, including a 22 year-old British national...
Read more →Nokia has secured a five-year extension of its long-standing agreement to supply routers and switches to Microsoft Azure datacentres worldwide....
Read more →Renewable energy supplier RWE is tapping into HPE’s private cloud and artificial intelligence (AI) technologies so it can use weather...
Read more →