Open cyber standards key to cross-platform integration

The Security Think Tank looks at platformisation considering questions such as how CISOs can distinguish between a truly integrated platform and ‘integration theater, and how to protect unified platforms. Read more »

Resilience under pressure: How regional conflict is reshaping the Middle East tech strategy

From AWS outages in the UAE to stronger focus on data control and cyber security, tech leaders say the Israel-US-Iran conflict is challenging, but not stopping the region’s digital... Read more »

NCSC: No increase in cyber threat from Iran, but be prepared

While cyber threat levels remain stable following the outbreak of war in the Middle East at the weekend, at-risk organisations in the UK should take steps now to ward... Read more »

UK government consults on social media ban for under-16s  

A UK government consultation launched today asks whether under-16s should be banned from social media, and age restrictions introduced for VPNs and chatbots Read more »

Weighing up the enterprise risks of neocloud providers

Anything that expands quickly can attract bubble accusations, and the market for cloud services in an AI age doesn’t look to be different Read more »

Qilin crew continues to dominate ransomware ecosystem

The Qilin ransomware gang remained ‘top dog’ in January 2026 with over 100 observed cyber attacks to its name, amid a rapidly evolving, and fragmenting, cyber criminal ecosystem. Read more »

Fake UK government website redirect detection time reduced to eight days

It used to take two months, but the UK government has reduced the time it takes to address fake DNS redirects Read more »

Cisco Catalyst SD-WAN users targeted in series of cyber attacks

The NCSC, Cisa, and other Five Eyes agencies have warned of mass exploitation of vulnerabilities in Cisco Catalyst SD-WAN, which Cisco is attributing to an unknown threat actor called... Read more »

Application exploitation back in vogue, says IBM cyber unit

IBM’s X-Force unit observes an uptick in the exploitation of vulnerable public-facing software applications Read more »

Police created ‘intelligence profile’ of BBC journalist subject to phone surveillance

Police and MI5 conducted seven unlawful operations to obtain phone data relating to former BBC journalist Vincent Kearney, the Investigatory Powers Tribunal heard today Read more »
Subscribe to our Newsletter