Should you run VMware 7 unsupported?

In just a few weeks, VMware version 7 reaches end of life, which means Broadcom will no longer issue patches Read more »

Heightened global risk pushes interest in data sovereignty

Survey finds all those questioned have looked at data location, with most recognising the need to plan for data sovereignty or risk severe damage to reputation and customer trust Read more »

Podcast: Data sovereignty and what you need to do about it

Patrick Smith, EMEA CTO of Pure Storage, talks about data sovereignty, what’s driving heightened interest in it, and how customers, the tech industry and states are preparing for it Read more »

Microsoft scores win against Office 365 credential thieves

Microsoft’s Digital Crimes Unit disrupts a major phishing-as-a-service operation that targeted and stole Office 365 usernames and credentials Read more »

Lufthansa pilots EU Digital Identity Wallet-based travel

Travellers will only be required to tap their phone to pass the various steps of checking in and boarding aircraft Read more »

Hamas lawyer challenges police after they seized legal files from phone in Schedule 7 stop

A UK solicitor hired by Hamas to challenge its proscription in the UK as a terrorist organisation argues police acted unlawfully by seizing a phone containing confidential legally privileged... Read more »

NCC: How RaaS team-ups help Scattered Spider enhance its attacks

Scattered Spider’s alliances with ransomware-as-a-service gangs act as a force multiplier for the scope, and number, of its cyber attacks, according to NCC Group analysts Read more »

NCC: How RaaS team-ups help Scattered Spider enhance its attacks

Scattered Spider’s alliances with ransomware-as-a-service gangs act as a force multiplier for the scope, and number, of its cyber attacks, according to NCC Group analysts Read more »

Jaguar Land Rover extends production shutdown for another week

Jaguar Land Rover says that vehicle production will remain suspended in the wake of a cyber attack, while the hackers allegedly responsible claim they are retiring from a life... Read more »

Cyber leaders must make better use of risk experts

The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not... Read more »
Subscribe to our Newsletter