Giant software vendor Alcatel-Lucent Enterprise is bolstering its networking and edge security capabilities by offering technologies from Versa Networks in its portfolio. The European-based company recently announced that Versa’s... Read more »
Exchanging data across networks and within enterprises requires security measures to protect the data from being lost or stolen. How do you ensure that your company’s sensitive data isn’t... Read more »
You’ve accidentally deleted a file. Your system crashed and you lost data as a result. A virus infiltrated your systems and deleted or otherwise altered important company documents. Many... Read more »
In recent years , the use of cloud-based solutions have become increasingly popular across all industries. Businesses need reliable, flexible, and cost-effective ways to communicate with their customers, and... Read more »
The UK’s new Online Crime Centre, launching next month, will bring together government, police, intelligence agencies, banks, mobile networks and tech firms to take coordinated action against cyber fraud. Read more »
The US has unveiled a six pillar national cyber security strategy, with developing technological areas such as post-quantum cryptography and artificial intelligence from and centre. Read more »
The 2024 Scattered Spider attack on Transport for London affected approximately 10 million people, many of whom remain blissfully unaware their data was compromised Read more »
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and ‘integration theater, and how to protect unified platforms. Read more »
Former detective Clive Driscoll, who secured convictions in the Stephen Lawrence case, calls for better checks after Instagram ‘memorialised’ the account of a child without the family’s knowledge Read more »
Baltic and Nordic countries work together on a common certification system to support digital wallet applications Read more »
Exploitation of zero-days by commercial surveillance and spyware developers outpaced exploitation by nation-state actors last year, according to a report Read more »
Hacktivist activity surrounding the Iran war is sky-high but Iran’s state-backed cyber espionage actors have yet to show their hands, giving security teams a valuable window of time to... Read more »
Google and Qualcomm have tag-teamed a serious vulnerability in the chipsets used in Android mobile devices, which has been exploited in the wild as a zero-day Read more »
A Europol-led sting against the infamous Tycoon2FA MFA bypass phishing service has been successful, with operations disrupted and ringleaders and cyber criminal users identified Read more »
