Qualys goes to bat for US cricket side San Francisco Unicorns

Cloud security specialist Qualys partners with US T20 cricket squad San Francisco Unicorns and its Sparkle Army fanclub as the team prepares for its summer 2025 campaign Read more »

Digital ID sector calls for changes to government data legislation

Suppliers urge technology secretary to work more collaboratively with private sector over concerns government’s digital wallet will gain a monopoly in the market Read more »

Cyber attack downs systems at Marks & Spencer

A cyber attack at Marks & Spencer has caused significant disruption to customers, leaving them unable to make contactless payments or use click-and-collect services. Read more »

Cyber ‘agony aunts’ launch guidebook for women in security

Cyber ‘agony aunts’ Amelia Hewitt and Rebecca Taylor are launching a book aimed at empowering women in their cyber security careers Read more »

Secure Future Initiative reveals Microsoft staff focus

IT security is now a metric in the Microsoft employee appraisal process Read more »

Beyond baselines – getting real about security and resilience

In an increasingly contested world, the UK government needs a security certification that goes beyond baseline measures. Read more »

Ofcom bans leasing of Global Titles to crackdown on spoofing

Telco regulator Ofcom is cracking down on a loophole being exploited by cyber criminals to access sensitive mobile data Read more »

AI-powered APIs proving highly vulnerable to attack

The growth of AI is proving a double-edged sword for API security, presenting opportunities for defenders to enhance their resilience, but also more risks from AI-powered attacks, according to... Read more »

Investigatory Powers Tribunal has no power to award costs against PSNI over evidence failures

Investigatory Powers Tribunal judges have called for the Home Secretary to step in after finding they have no powers to award costs against government bodies that fail to disclose... Read more »

What is a brute-force attack?

A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems. Read more »
Subscribe to our Newsletter