Companies House ID verification to start in November 2025

Companies House plans to start vetting director identities from the middle of November, but its reliance on the troubled One Login digital identity service may be cause for concern. Read more »

NCSC updates CNI Cyber Assessment Framework

Updates to the NCSC’s Cyber Assessment Framework are designed to help critical services providers better manage their risk profiles. Read more »

What is enterprise risk management (ERM)?

Enterprise risk management (ERM) is the process of planning, organizing, directing and controlling the activities of an organization to minimize the harmful effects of risk on its capital and... Read more »

Australian scaleup to bring AI-led data protection to the MoD

The UK’s Ministry of Defence is embracing AI-led data protection in the wake of a major privacy breach, enlisting Australian cyber firm Castlepoint Systems to oversee sensitive records Read more »

Attacker could defeat Dell firmware flaws with a vegetable

Cisco Talos discloses five new vulnerabilities in cyber security firmware used on Dell Lattitude and Precision devices, including one that could enable an attacker to log-on with a spring... Read more »

8 ways to enhance data center physical security

Data center physical security is just as important as cybersecurity. Organizations can follow these eight security approaches to enhance facility access monitoring. Read more »

What is the DRY principle?

The DRY (don’t repeat yourself) principle, introduced by Andrew Hunt and David Thomas in ‘The Pragmatic Programmer,’ promotes the idea that every piece of knowledge should have a single,... Read more »

Black Hat USA: Halcyon and Sophos tag-team ransomware fightback

Ransomware experts Halcyon and Sophos are to pool their expertise in ransomware, working together to enhance data- and intelligence-sharing and bringing more comprehensive protection to customers. Read more »

Proliferation of on-premise GenAI platforms is widening security risks

Research finds increased adoption of unsanctioned generative artificial intelligence platforms is magnifying risk and causing a headache for security teams Read more »

Agentic AI a target-rich zone for cyber attackers in 2025

At Black Hat USA 2025, CrowdStrike warns that cyber criminals and nation-states are weaponising GenAI to scale attacks and target AI agents, turning autonomous systems against their makers Read more »
Subscribe to our Newsletter