UK cyber action plan lays out path to resilience

A report produced for the government by academics at Imperial College London and the University of Bristol sets out nine recommendations to strengthen the UK’s cyber sector Read more »

UK needs better defences to protect undersea internet cables from Russian sabotage

A cross-party group of MPs and peers has called for the UK to step up defences to protect undersea cables from Russian sabotage risks Read more »

French court ruling may lead to legal challenges over state Sky ECC and EncroChat phone hack

A decision by the French supreme court may pave the way for defendants to challenge the lawfulness of France’s hacking of the EncroChat and Sky ECC cryptophone networks used... Read more »

What is hardware security?

Hardware security is vulnerability protection that comes in the form of a physical device rather than software installed on a computer system’s hardware. It also refers to the protection... Read more »

Are AI agents a blessing or a curse for cyber security?

Agentic AI is touted as a helpful tool for managing tasks, and cyber criminals are already taking advantage. Should information security teams look to AI agents to keep up? Read more »

Teen hackers charged over Scattered Spider attack on TfL

Two men have appeared in court in London in connection with the September 2024 cyber attack that disrupted online services at Transport for London Read more »

Should you run VMware 7 unsupported?

In just a few weeks, VMware version 7 reaches end of life, which means Broadcom will no longer issue patches Read more »

Heightened global risk pushes interest in data sovereignty

Survey finds all those questioned have looked at data location, with most recognising the need to plan for data sovereignty or risk severe damage to reputation and customer trust Read more »

Podcast: Data sovereignty and what you need to do about it

Patrick Smith, EMEA CTO of Pure Storage, talks about data sovereignty, what’s driving heightened interest in it, and how customers, the tech industry and states are preparing for it Read more »

Microsoft scores win against Office 365 credential thieves

Microsoft’s Digital Crimes Unit disrupts a major phishing-as-a-service operation that targeted and stole Office 365 usernames and credentials Read more »
Subscribe to our Newsletter