Human vs digital therapy: AI falls short when IT pros need help

Stressed IT and cyber professionals are turning to AI chatbots for support, but is handing people’s mental wellbeing over to algorithms really such a bright idea? Read more »

Investor behaviour in the wake of cyber’s ‘black swan’ moment

So-called Black Swan events expose the blind spots in even the most sophisticated forecasting models, signaling a need to rethink how businesses, and those investing in them, quantify and... Read more »

Government using national security as ‘smokescreen’ in Apple encryption row

Senior conservative MP David Davis says the Home Office should disclose how many secret orders it has issued against telecoms and internet companies to Parliament Read more »

Cyber Bill at risk of becoming a missed opportunity, say MPs

An APPG report warns that the government’s flagship cyber security legislation is too narrow in its scope and risks missing opportunities to embed resilience at the heart of the... Read more »

June Patch Tuesday brings a lighter load for defenders

Barely 70 vulnerabilities make the cut for Microsoft’s monthly security update, but an RCE flaw in WEBDAV and an EoP issue in Windows SMB Client still warrant close attention. Read more »

How to choose coding standards: Development best practices

Learn how coding standards enhance quality and efficiency in software projects. Follow coding conventions and standards to achieve the five pillars of code quality. Read more »

UK defence scheme invests in future cyber tech Cheri

Cambridge-based SCI Semiconductors is awarded DTEP funding to work on the application of defensive Cheri technology Read more »

US lawmakers say UK has ‘gone too far’ by attacking Apple’s encryption

US politicians are calling for Congress to rewrite the US Cloud Act to prevent the UK issuing orders to require US tech companies to introduce ‘backdoors’ in end-to-end encrypted... Read more »

HMRC phishing breach wholly avoidable, but hard to stop

A breach at HMRC saw innocent taxpayers tricked into letting scammers impersonate them through simple phishing attacks leading to account takeover. Such attacks are avoidable, but hard to stop. Read more »

CISOs: Don’t block AI, but adopt it with eyes wide open

The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data... Read more »
Subscribe to our Newsletter