Hardware security is vulnerability protection that comes in the form of a physical device rather than software installed on a computer system’s hardware. It also refers to the protection... Read more »
Agentic AI is touted as a helpful tool for managing tasks, and cyber criminals are already taking advantage. Should information security teams look to AI agents to keep up? Read more »
Two men have appeared in court in London in connection with the September 2024 cyber attack that disrupted online services at Transport for London Read more »
In just a few weeks, VMware version 7 reaches end of life, which means Broadcom will no longer issue patches Read more »
Patrick Smith, EMEA CTO of Pure Storage, talks about data sovereignty, what’s driving heightened interest in it, and how customers, the tech industry and states are preparing for it Read more »
Survey finds all those questioned have looked at data location, with most recognising the need to plan for data sovereignty or risk severe damage to reputation and customer trust Read more »
Microsoft’s Digital Crimes Unit disrupts a major phishing-as-a-service operation that targeted and stole Office 365 usernames and credentials Read more »
Travellers will only be required to tap their phone to pass the various steps of checking in and boarding aircraft Read more »
A UK solicitor hired by Hamas to challenge its proscription in the UK as a terrorist organisation argues police acted unlawfully by seizing a phone containing confidential legally privileged... Read more »
Scattered Spider’s alliances with ransomware-as-a-service gangs act as a force multiplier for the scope, and number, of its cyber attacks, according to NCC Group analysts Read more »