With the entry of the US into the widening Middle Eastern conflict, cyber risk is likely to increase across the board. Read more »
Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made. Read more »
Pure risk refers to risks that are beyond human control and result in a loss or no loss, with no possibility of financial gain. Read more »
A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. This exploit is also known as a ‘half-open attack.’ Read more »
The number of businesses attaining the NCSC Cyber Essentials certification continues to increase, but much more can be done to raise awareness of the scheme. Read more »
The UK’s Cyber Monitoring Centre has published its first in-depth assessment of a major incident, reflecting on the impact of and lessons learned from Scattered Spider attacks on M&S... Read more »
Oxford City Council election workers had personal information stolen by cyber attackers in an attack over the weekend of 7-8 June. The council has stated that most disrupted systems... Read more »
The UK is at risk of becoming an ‘algorithm state’ as the government hands more power to Big Tech and reduces the rights of individuals Read more »
Risk assessment is the process of identifying hazards that could negatively affect an organization’s ability to conduct business. Read more »
UBS and fellow Swiss bank Pictet have been affected by a cyber attack on a procurement service provider Read more »