CIO interview: Keith Woolley, chief digital information officer, University of Bristol
There comes a time in every digital leader’s career when they fancy doing something different. Keith Woolley has a strong...
Read more →There comes a time in every digital leader’s career when they fancy doing something different. Keith Woolley has a strong...
Read more →Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat actors unauthorized access to sensitive data....
Read more →Android phones are vulnerable to attacks that could allow someone to takeover a device remotely without the device owner needing...
Read more →Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the ever-evolving realm of...
Read more →The Home Office’s mega £450m public cloud hosting contract with Amazon Web Services (AWS) is concerning public sector market watchers...
Read more →Daon announced the addition of xSentinel, an expansion of its AI.X technology. xSentinel provides adaptive synthetic voice protection to create...
Read more →Dec 07, 2023The Hacker NewsMobile Security / Vulnerability A critical Bluetooth security flaw could be exploited by threat actors to...
Read more →Thanks to artificial intelligence (AI) and, in particular, the hype surrounding generative AI (GenAI) and foundational models, server company execs...
Read more →Flashpoint’s latest report redefines the Vulnerability Management system and challenges the current standards set by CVE. Reaching a noteworthy milestone,...
Read more →Dec 07, 2023The Hacker NewsThreat Intelligence / Network Security Threat intelligence refers to gathering, processing, and analyzing cyber threats, along...
Read more →Back in July 2021, I wrote a piece for Computer Weekly on what security teams like mine needed to consider...
Read more →AI security researchers from Robust Intelligence and Yale University have designed a machine learning technique that can speedily jailbreak large...
Read more →