SOC 2, ISO, HIPAA, Cyber Essentials – all the security frameworks and certifications today are an acronym soup that can…
IT contractors are being forced into providing their services through umbrella companies “against their will”, with many complaining about not…
In a recent cybersecurity news development, a user on a hacker forum made a startling statement about the Sony data…
Sony has launched an investigation after a cybercrime group claimed to have compromised the company’s systems, offering to sell stolen…
BORN Ontario data breach impacted 3.4 million newborns and pregnancy care patients Pierluigi Paganini September 26, 2023 The Better Outcomes…
Immersive Labs unveiled the expansion of its AI-ready platform, now with coverage across the entire organization through its new Workforce…
In an age of cloud-native applications, object storage is the future, and storage area network (SAN) and network attached storage…
The average tenure of a Chief Information Security Officer said to sit between 18 to 24 months. This is barely…
How To Use This Report Enhance situational awareness of techniques used by threat actors Identify potential attacks targeting your industry…
Recently identified Xenomorph Android banking trojan samples show an expanded target list that now includes North American users, online fraud…
Ransomed.vc, a relatively new ransomware / cyber extortion group, claims to have hacked Sony and made off with valuable data….
Despite broad hints from the likes of the Information Commissioner’s Office (ICO) and the National Cyber Security Centre (NCSC) that…