Recruiters can’t afford to hold out for cyber ‘unicorns’

Recruiters looking to fill vacant cyber security roles cannot afford to wait around for the perfect “unicorn” candidate, and need to adopt a more pragmatic approach to hiring policy,... Read more »

Office 365 compromise likely led to Merseyrail ransomware attack

A Lockbit ransomware attack on train operating company Merseyrail appears to have been the result of a successful compromise of a privileged Microsoft Office 365 account, prompting fresh warnings... Read more »

NHS app to serve as vaccine passport for foreign holidays

As the government moves closer to reopening the UK to non-essential travel, transport secretary Grant Shapps has revealed that vaccine passport functionality to enable people to prove they have... Read more »

Backup failure: Four key areas where backups go wrong

Despite the prevalence of many forms of data protection – that range from local RAID via snapshots and replication to keeping copies in the cloud – the facts of... Read more »

Applying web application reconnaissance to offensive hacking

Securing web applications is a team sport. To stand a chance against a growing onslaught of web application attacks, software engineers and security practitioners need to know when to... Read more »

Collaboration is key to a secure web application architecture

The number of web-based applications used by organizations large and small has significantly expanded in the digital transformation age. As a result, the attack surface area has also grown... Read more »

Total cost of ransomware attack heading towards $2m

The average total cost to an organisation of recovering from a ransomware attack has more than doubled in the space of just 12 months, rising from $761,106 (£588,000 at... Read more »

Why we need to reset the debate on end-to-end encryption to protect children

Last week, the National Society for the Prevention of Cruelty to Children (NSPCC) released a report in a bid to raise understanding of the impact of end-to-end encryption (E2EE) on children’s... Read more »

Leaky Azure storage account puts software developer IP at risk

A degree of mystery surrounds the provenance of a newly discovered cache of confidential source code data that was left exposed and accessible in a misconfigured Microsoft Azure Blob... Read more »

Apple OS updates patch multiple security holes

Users of Apple mobile devices are being urged to upgrade their phones and tablets to the latest version of iOS 14.5 in order to mitigate the impact of a... Read more »
Subscribe to our Newsletter