Disruption continues a week after core services at Glasgow City Council were forced offline following a cyber attack on a third-party IT services provider Read more »
SASE deployment mode applied at heart of leading Swiss telco’s converged networking and cyber security offering to deliver customised, advanced networking and security services directly from its own infrastructure Read more »
A Citrix NetScaler flaw that was quietly patched earlier in June is gathering widespread attention after experts noted strong similarities to the Citrix Bleed vulnerability that caused chaos in... Read more »
CCTV (closed-circuit television) is a video surveillance system in which signals are transmitted to a specific set of monitors and are not publicly broadcast. It is primarily used for... Read more »
Single sign-on (SSO) is a session and user authentication service that lets users access multiple applications or systems with a single set of login credentials. Read more »
UK organisations hit by ransomware attacks paid much higher ransoms than in other countries over the past 12 months, according to a new study. Read more »
Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets. Read more »
If the State Department’s arguments prevail in FOIA litigation, the truth about US action against Julian Assange and WikiLeaks journalists will never be known Read more »
With the entry of the US into the widening Middle Eastern conflict, cyber risk is likely to increase across the board. Read more »
Pure risk refers to risks that are beyond human control and result in a loss or no loss, with no possibility of financial gain. Read more »
