Good automated manufacturing practice (GAMP) is a set of guidelines for pharmaceutical manufacturers. Read more »
An input validation attack is any malicious cyberattack that involves an attacker manually entering strange, suspicious or unsafe information into a normal user input field of a target computer... Read more »
Retail is suffering economically and from hacking attacks. What steps can retailers can take to prevent cyber attacks, supply chain disruptions and migration downtime? Read more »
The UK’s proposed public sector ransomware payment ban could be a bold step, but it can’t operate in isolation. Read more »
While Europe debates quantum cyber security policies, the UAE has implemented quantum-resistant algorithm requirements, offering crucial lessons for organisations preparing for the post-quantum era Read more »
US AI Action Plan sets out plans to expand American dominance in the world of artificial intelligence Read more »
Microsoft’s security analysts confirm a number of cyber attacks on on-premise SharePoint Server users involve ransomware Read more »
Cleaning products manufacturer Clorox fell victim to a Scattered Spider social engineering attack two years ago – it blames its IT helpdesk provider, Cognizant Read more »
Dutch method to counter deepfakes analyses blood flow patterns in faces that current deepfake generation tools cannot yet replicate Read more »
Monzo’s recent fine over failings in its customer verification processes highlights wider security and privacy shortcomings in the personal finance world Read more »
