Computer Weekly gets under the skin of an ongoing wave of ShinyHunters cyber attacks orchestrated via social engineering against Salesforce users Read more »
Traditional security measures may not be able to cope with the AI reality. In order to safeguard enterprise operations, reputation and data integrity in an AI-first world, security leaders... Read more »
Dame Muffy Calder is chair of the Technical Advisory Panel (TAP), a small group of experts that advises the Investigatory Powers Commissioner on surveillance technology. Do they have what... Read more »
The three lines model is a risk management approach to help organizations identify and manage risks effectively by creating three distinct lines of defense. Read more »
As OpenAI’s latest large language model delivers smarter AI, experts are wary of the risks GPT-5 poses to human creativity Read more »
Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization’s security, risk tolerance profile and strategic decisions. Read more »
Researchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used CyberArk Conjur and HashiCorp Vault enterprise secrets management platforms Read more »
Okta details a phishing campaign in which the threat actor demonstrated some unusually strong opinions on what authentication methods they would like their targets to use. Read more »
Companies House plans to start vetting director identities from the middle of November, but its reliance on the troubled One Login digital identity service may be cause for concern. Read more »
Updates to the NCSC’s Cyber Assessment Framework are designed to help critical services providers better manage their risk profiles. Read more »
