Compliance stakeholders and how to work with them

Stakeholders’ involvement can strengthen an organization’s compliance program. Learn best practices for engaging key stakeholders in compliance initiatives. Read more »

Building the foundations: A national roadmap for digital identity and sovereign data

Now the UK government has offered some clarity on the future of private and public sector digital identity services, it’s time to work together to put the essential foundations... Read more »

Put ROCs before SOCs, Qualys tells public sector

Putting risk operations before security operations may help government agencies and other public sector bodies better manage the myriad threats they face, and make better decisions for the security... Read more »

NCSC sets out how to build cyber safe cultures

The UK’s National Cyber Security Centre has published guidance for security teams and leaders on how to foster accessible and appropriate cyber security cultures within their organisations. Read more »

Investigatory powers: Guidelines for police and spies could also help businesses with AI

Computer Weekly talks to Duffy Calder, technology advisor to the UK’s investigatory powers commissioner, about privacy, intrusion and artificial intelligence Read more »

SXSW London: Risk of AI removing choice

The modern era, where AI speeds up day-to-day chores, is undermining creativity and the ability to make choices Read more »

Microsoft outlines three-pronged European cyber strategy

Microsoft chair Brad Smith outlines an expansive cyber programme targeting governments across Europe with enhanced threat intelligence and support Read more »

Fortifying the future: The pivotal role of CISOs in AI operations

The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data... Read more »

Dutch university’s rapid response saved it from ransomware devastation

Eindhoven University of Technology has planned multi-factor authentication and regularly practised cyber crisis drills – yet it still fell victim to attackers who exploited gaps in its defences Read more »

Infosecurity 2025: SMEs feel on their own in the face of cyber attacks

Project findings to be presented at Infosecurity Europe 2025 highlight vulnerability of SMEs to cyber attack Read more »
Subscribe to our Newsletter