The rise of the splinternet? Data sovereignty risks and responses

We look at the political, legal and economic risks around data sovereignty, the fears for digital dependency and massive hyperscaler penetration in the UK public sector Read more »

This rise of the splinternet? Data sovereignty risks and responses

We look at the political, legal and economic risks around data sovereignty, the fears for digital dependency and massive hyperscaler penetration in the UK public sector Read more »

Vulnerability reports: Increase in quantity, decrease in quality?

Bug bounties have become a staple of the cyber security toolkit, offering researchers a way to get paid to find and report bugs and giving businesses a route to... Read more »

The UK government’s digital identity scheme: Dystopian nightmare or modernised public services?

Critics and supporters of digital ID are honing their arguments for the government’s consultation – but it’s the public that will decide. How should you choose? Read more »

Iran war a melting pot for other cyber threats

State-backed cyber threat actors from non-combatant states are taking advantage of the Israeli-US war on Iran to fulfil their own goals, according to Proofpoint analysts Read more »

Cyber industry welcomes women, but challenges persist

Three-quarters of women working in security say they feel comfortable in the field, but women are still much more likely to be laid off and face persistent challenges around... Read more »

Salesforce tracks possible ShinyHunters campaign targeting its users

Salesforce warns users of an uptick in malicious activity targeting Experience Cloud customers with misconfigured user settings via an open source tool Read more »

Confidence in AI-powered cyber must be earned, not assumed

In security, familiar testing and validation approaches are not enough when it comes to AI. The question is not just whether an AI-powered tool works but how it actually... Read more »

Strong security balances consolidation and best-of-breed capabilities

The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and ‘integration theater, and how to protect unified platforms. Read more »

Child rapist could have profiled victims through unaudited access to NHS databases

NHS analyst’s conviction for child sexual abuse offences raises concerns over unaudited access to patient data Read more »
Subscribe to our Newsletter