What is biometric authentication?

Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify their identity. Read more »

European cyber cops target NoName057(16) DDoS network

A Europol operation has succeeded in disrupting a pro-Russian hacktivist network accused of conducting DDoS cyber attacks on targets in Ukraine and Europe. Read more »

Estimated 96% of EMEA financial services sector not ready for DORA

Research from data backup provider Veeam indicates that vast majority of European financial services firms do not feel ready to meet the resiliency requirements of the EU’s DORA act Read more »

Co-op chief ‘incredibly sorry’ for theft of 6.5m members’ data

Co-op chief executive Shirine Khoury-Haq has revealed that all the personal data of all 6.5 million of its members was compromised in the April 2025 cyber attack on its... Read more »

Scattered Spider playbook evolving fast, says Microsoft

Microsoft warns users over notable evolutions in Scattered Spider’s attack playbook, and beefs up some of the defensive capabilities it offers to customers in response. Read more »

Forrester urges IT leaders to dump technical debt

IT needs to invest in innovative technologies and outsource legacy IT management to tackle volatile global markets, says Forrester Read more »

Current approaches to patching unsustainable, report says

Organisations are struggling to prioritise vulnerability patching appropriately, leading to situations where everything is a crisis, which helps nobody, according to a report. Read more »

MoD cyber breach put thousands of Afghan lives at risk

Over 18,000 Afghan citizens eligible to relocate to the UK under a government programme to protect them from the Taliban were put at risk in a heretofore unreportable data... Read more »

NCSC sets up Vulnerability Research Initiative

The NCSC is expanding its vulnerability research project to draw in external expertise Read more »

What is cybersecurity?

Cybersecurity is the practice of protecting systems, networks and data from digital threats. Read more »
Subscribe to our Newsletter