Confidential computing is a concept in which encrypted data can be processed in memory to limit access to protect data in use. It is especially suitable for public clouds. Read more »
Market concentration refers to how a market is distributed among competing companies. Read more »
Hash-based message authentication code (HMAC) is a message encryption method that uses a cryptographic key with a hash function. Read more »
A compliance audit is critical for finding any potential compliance gaps in an organization’s operations. Here’s what companies can do to prepare for them. Read more »
The recent spate of cyber attacks on UK retailers has to be a wake-up call to build more cyber resilience into digital supply chains and fortify against social engineering... Read more »
Amid growing calls for a national digital ID scheme, Home Affairs Committee launches inquiry into likely benefits and risks Read more »
The chancellor of the exchequer has significantly upped spending on digital and technology initiatives in the current Spending Review period, with the NHS receiving a 50% tech funding increase. Read more »
WhatsApp today applied to intervene in an Investigatory Powers Tribunal case that is considering the UK’s ability to issue a technical capability notice on Apple to ‘weaken encryption’ Read more »
Cyber security has been everything from a tick-box exercise to a compliance headache for organisations – but the pressing threats we face mean cyber resilience must become a boardroom... Read more »
Stressed IT and cyber professionals are turning to AI chatbots for support, but is handing people’s mental wellbeing over to algorithms really such a bright idea? Read more »
