UK government says its cyber growth action plan will provide a large boost to Britain’s security industry as it sets out to create a roadmap for future growth Read more »
Following a series of high-profile attacks on prominent retailers and consumer brands, the Scattered Spider cyber crime collective appears to be expanding its targeting to the insurance sector Read more »
Confidential computing is a concept in which encrypted data can be processed in memory to limit access to protect data in use. It is especially suitable for public clouds. Read more »
Market concentration refers to how a market is distributed among competing companies. Read more »
A compliance audit is critical for finding any potential compliance gaps in an organization’s operations. Here’s what companies can do to prepare for them. Read more »
Hash-based message authentication code (HMAC) is a message encryption method that uses a cryptographic key with a hash function. Read more »
The recent spate of cyber attacks on UK retailers has to be a wake-up call to build more cyber resilience into digital supply chains and fortify against social engineering... Read more »
Amid growing calls for a national digital ID scheme, Home Affairs Committee launches inquiry into likely benefits and risks Read more »
The chancellor of the exchequer has significantly upped spending on digital and technology initiatives in the current Spending Review period, with the NHS receiving a 50% tech funding increase. Read more »
WhatsApp today applied to intervene in an Investigatory Powers Tribunal case that is considering the UK’s ability to issue a technical capability notice on Apple to ‘weaken encryption’ Read more »