The EU Cyber Solidarity Act Is Coming: Here’s What it Means
The EU is not short on cybersecurity legislation. Over the past year, it has introduced laws covering smart devices, AI safety, financial services,...
The EU is not short on cybersecurity legislation. Over the past year, it has introduced laws covering smart devices, AI safety, financial services,...
It’s been over three years since Log4Shell, a critical vulnerability in a little-known open-source library, was discovered. With a CVSS score...
The past 12 months have once again taught us that while technology continues to advance at sometimes blinding speed, many of the macro trends in se...
It’s been another year full of incidents for security and compliance teams. Buffeted by ransomware attacks, supply chain and open source threats, i...
A new technological development is coming in the ongoing arms race between network defenders and their adversaries, which could dramatically disrup...
UK regulation rarely steals a march on the EU. Yet that is precisely what happened in April 2024 when the UK’s Product Security and Telecommu...
Modems and routers aren’t the most glamorous of connected technologies. In fact, their ubiquity means that most organisations forget theyR...
The digital world is an increasingly dangerous place for Australian organisations. A string of high-profile data breaches and ransomware attacks ov...
This year is on track to be a record-breaker for ransomware groups. Blockchain analysis reveals that “inflows” to cryptocurrency addresses associat...
The speed at which AI innovation is moving has caught many by surprise. In some countries, lawmakers are struggling to keep up, oscillating between...
Ransomware is the cybersecurity story of the past decade. But over that time, adversary tactics, techniques, and procedures (TTPs) have continued t...
As guardians of highly sensitive personal information and world-class research, the UK’s higher education (HE) institutions are popular targe...
Managers play a unique role in their organisation—solving problems, managing risk and interfacing between senior leadership and rank-and-file emplo...
As elsewhere, data breach costs in the UK continue to rise. The latest (19th) edition of the IBM Cost of a Data Breach report puts the figure at $4...
Open-source dependencies have become a growing source of risk for organisations of all shapes and sizes. Log4j, xz Utils and other high-profile sto...
Data breach fines are on the rise. According to the ISMS.online State of Information Security Report 2024, the average fine amount responding busin...
In June this year, a mass extortion campaign against customers of data cloud specialist Snowflake was discovered. According to reports, victims wer...
NIS2 will be transposed into law across all EU member states in three months. It mandates enhanced baseline security, incident response, supply cha...
Every year, the cybersecurity industry comes together at Europe’s largest industry event: Infosecurity Europe. The scale of the show—at Londo...
In April, the government told us that half of UK businesses had suffered a breach over the previous 12 months, rising to even higher for medium (70...
The UK’s universities are being assailed from all sides. A report last year revealed that dozens of institutions had accepted at least £122m-156m f...
There’s more computing power in a single smartphone today than was available to mission control during the Apollo 11 moon landing. That’s the kind ...
Industry trends come and go. but one staple of the cybersecurity landscape over the past 17 years has been the Verizon Data Breach Investigations R...
Company number: 04922343
Nile House, Nile Street, Brighton, England, BN1 1HW