Cyril Pourrat is head of procurement at BT Sourced, a separate procurement business within telco giant BT. He describes the…
by Anna Collard, SVP of Content Strategy and Evangelist at KnowBe4 Africa I always enjoyed drawing, and as a kid…
Britain will make another attempt to reform its data protection law with the objective of easing the compliance burden for…
[ This article was originally published here ] Spoiler alert: the obvious answer is not always the correct one! Migrating…
92% of organizations have fallen victim to successful phishing attacks in the last 12 months, while 91% of organizations have…
Mar 08, 2023Ravie LakshmananAdvanced Persistent Threat High-profile government entities in Southeast Asia are the target of a cyber espionage campaign…
As part of its Making Finance Brilliant Programme, BT is implementing SAP S/4Hana for finance to provide a digital core…
Cybersecurity is evolving, not only because of hackers and cybercriminals, who are finding new ways to invade systems, but in…
Arista has discovered an access control bug affecting some versions of its CloudVision Portal product. The vulnerability, CVE-2023-24546, affects eight…
[ This article was originally published here ] Cybercrime may have less of a gender issue than cybersecurity, LastPass gives…
In this Help Net Security video, Avani Desai, CEO at Schellman, talks about how teaching STEM subjects like cybersecurity is…
Mar 08, 2023Ravie LakshmananVulnerability / Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to…







