Giant software vendor Alcatel-Lucent Enterprise is bolstering its networking and edge security capabilities by offering technologies from Versa Networks in its portfolio. The European-based company recently announced that Versa’s... Read more »
Exchanging data across networks and within enterprises requires security measures to protect the data from being lost or stolen. How do you ensure that your company’s sensitive data isn’t... Read more »
You’ve accidentally deleted a file. Your system crashed and you lost data as a result. A virus infiltrated your systems and deleted or otherwise altered important company documents. Many... Read more »
In recent years , the use of cloud-based solutions have become increasingly popular across all industries. Businesses need reliable, flexible, and cost-effective ways to communicate with their customers, and... Read more »
Under pressure to deliver in the fight against serious cross-border crime, Europol built and operated a shadow data analysis platform containing large volumes of sensitive information, which operated without... Read more »
Vulnerability discovery and mitigation continues to exercise the top minds at Britain’s NCSC as cyber experts continue to debate the impact of frontier AI models like Mythos. Read more »
Oracle Red Bull Racing massively improved the efficiency of its aerodynamics testing procedures after implementing new identity technology from 1Password. Learn more about this unlikely link Read more »
During the annual CETaS showcase in London, experts discussed the potential cyber risk of tools such as Claude Mythos Read more »
The government’s annual cyber security report reveals UK businesses are still struggling with the impact of attacks and breaches. Read more »
Owen Sayers of Secon Solutions argues that as data sovereignty comes under scrutiny the more chimera-like it looks, but that ventures like Google’s S3NS in France show potential Read more »
University of Cambridge study reveals the risks facing the finance sector as it adopts artificial intelligence Read more »
The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, we look at the specific impacts of agentic AI on the security stack. Read more »
Analysis of a new form of ransomware called Vect has uncovered a serious flaw that breaks its core functionality and turns it from a locker to a wiper. Read more »
Bank pays out compensation to more customers and reveals expansion of affected group Read more »
