Will the UK’s AI Growth Plans Also “Mainline” Cyber Threats?
The UK has, for over a decade, been an economic underachiever. Since the financial crisis of 2008-9, productivity has barely risen, increasing the ...
The UK has, for over a decade, been an economic underachiever. Since the financial crisis of 2008-9, productivity has barely risen, increasing the ...
The UK’s critical national infrastructure (CNI) is named so for a reason. However, the large volumes of sensitive data that providers store, their ...
The EU is not short on cybersecurity legislation. Over the past year, it has introduced laws covering smart devices, AI safety, financial services,...
It’s been over three years since Log4Shell, a critical vulnerability in a little-known open-source library, was discovered. With a CVSS score...
The past 12 months have once again taught us that while technology continues to advance at sometimes blinding speed, many of the macro trends in se...
It’s been another year full of incidents for security and compliance teams. Buffeted by ransomware attacks, supply chain and open source threats, i...
A new technological development is coming in the ongoing arms race between network defenders and their adversaries, which could dramatically disrup...
UK regulation rarely steals a march on the EU. Yet that is precisely what happened in April 2024 when the UK’s Product Security and Telecommu...
Modems and routers aren’t the most glamorous of connected technologies. In fact, their ubiquity means that most organisations forget theyR...
The digital world is an increasingly dangerous place for Australian organisations. A string of high-profile data breaches and ransomware attacks ov...
This year is on track to be a record-breaker for ransomware groups. Blockchain analysis reveals that “inflows” to cryptocurrency addresses associat...
The speed at which AI innovation is moving has caught many by surprise. In some countries, lawmakers are struggling to keep up, oscillating between...
Ransomware is the cybersecurity story of the past decade. But over that time, adversary tactics, techniques, and procedures (TTPs) have continued t...
As guardians of highly sensitive personal information and world-class research, the UK’s higher education (HE) institutions are popular targe...
Managers play a unique role in their organisation—solving problems, managing risk and interfacing between senior leadership and rank-and-file emplo...
As elsewhere, data breach costs in the UK continue to rise. The latest (19th) edition of the IBM Cost of a Data Breach report puts the figure at $4...
Open-source dependencies have become a growing source of risk for organisations of all shapes and sizes. Log4j, xz Utils and other high-profile sto...
Data breach fines are on the rise. According to the ISMS.online State of Information Security Report 2024, the average fine amount responding busin...
In June this year, a mass extortion campaign against customers of data cloud specialist Snowflake was discovered. According to reports, victims wer...
NIS2 will be transposed into law across all EU member states in three months. It mandates enhanced baseline security, incident response, supply cha...
Every year, the cybersecurity industry comes together at Europe’s largest industry event: Infosecurity Europe. The scale of the show—at Londo...
In April, the government told us that half of UK businesses had suffered a breach over the previous 12 months, rising to even higher for medium (70...
The UK’s universities are being assailed from all sides. A report last year revealed that dozens of institutions had accepted at least £122m-156m f...
Company number: 04922343
Nile House, Nile Street, Brighton, England, BN1 1HW