We look at the political, legal and economic risks around data sovereignty, the fears for digital dependency and massive hyperscaler penetration in the UK public sector Read more »
We look at the political, legal and economic risks around data sovereignty, the fears for digital dependency and massive hyperscaler penetration in the UK public sector Read more »
Bug bounties have become a staple of the cyber security toolkit, offering researchers a way to get paid to find and report bugs and giving businesses a route to... Read more »
Critics and supporters of digital ID are honing their arguments for the government’s consultation – but it’s the public that will decide. How should you choose? Read more »
State-backed cyber threat actors from non-combatant states are taking advantage of the Israeli-US war on Iran to fulfil their own goals, according to Proofpoint analysts Read more »
Three-quarters of women working in security say they feel comfortable in the field, but women are still much more likely to be laid off and face persistent challenges around... Read more »
Salesforce warns users of an uptick in malicious activity targeting Experience Cloud customers with misconfigured user settings via an open source tool Read more »
In security, familiar testing and validation approaches are not enough when it comes to AI. The question is not just whether an AI-powered tool works but how it actually... Read more »
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and ‘integration theater, and how to protect unified platforms. Read more »
NHS analyst’s conviction for child sexual abuse offences raises concerns over unaudited access to patient data Read more »
