Alcatel-Lucent Adds Versa SD-WAN, SASE to Network Portfolio

Giant software vendor Alcatel-Lucent Enterprise is bolstering its networking and edge security capabilities by offering technologies from Versa Networks in its portfolio. The European-based company recently announced that Versa’s... Read more »

Data Loss Prevention (DLP) Best Practices & Strategies

Exchanging data across networks and within enterprises requires security measures to protect the data from being lost or stolen. How do you ensure that your company’s sensitive data isn’t... Read more »

Best Data Recovery Software for Restoring Data 2021

You’ve accidentally deleted a file. Your system crashed and you lost data as a result. A virus infiltrated your systems and deleted or otherwise altered important company documents. Many... Read more »

Contact Center as a Service (CCaaS) vs. Communications Platform as a Service (CPaaS)

In recent years , the use of cloud-based solutions have become increasingly popular across all industries. Businesses need reliable, flexible, and cost-effective ways to communicate with their customers, and... Read more »

‘They protect the law while breaking it’: Inside Europol’s shadow IT system

Under pressure to deliver in the fight against serious cross-border crime, Europol built and operated a shadow data analysis platform containing large volumes of sensitive information, which operated without... Read more »

UK’s NCSC warns of ‘wave of patches’

Vulnerability discovery and mitigation continues to exercise the top minds at Britain’s NCSC as cyber experts continue to debate the impact of frontier AI models like Mythos. Read more »

IAM tools help Oracle Red Bull Racing keep pace with strict F1 regulations

Oracle Red Bull Racing massively improved the efficiency of its aerodynamics testing procedures after implementing new identity technology from 1Password. Learn more about this unlikely link Read more »

Cyber experts take an optimistic view of AI-powered hacking

During the annual CETaS showcase in London, experts discussed the potential cyber risk of tools such as Claude Mythos Read more »

Almost half of UK businesses hit by cyber attacks

The government’s annual cyber security report reveals UK businesses are still struggling with the impact of attacks and breaches. Read more »

Data is a sovereignty issue. And broader than just the hyperscalers

Owen Sayers of Secon Solutions argues that as data sovereignty comes under scrutiny the more chimera-like it looks, but that ventures like Google’s S3NS in France show potential Read more »

Global study reveals biggest risks of AI in finance sector

University of Cambridge study reveals the risks facing the finance sector as it adopts artificial intelligence Read more »

Why AI agents are triggering a rethink of enterprise identity

The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, we look at the specific impacts of agentic AI on the security stack. Read more »

Vect ransomware actually destructive wiper malware

Analysis of a new form of ransomware called Vect has uncovered a serious flaw that breaks its core functionality and turns it from a locker to a wiper. Read more »

Lloyds Bank compensates another 1,625 customers after ‘alarming’ data breach

Bank pays out compensation to more customers and reveals expansion of affected group Read more »
Subscribe to our Newsletter