What is hardware security?

Hardware security is vulnerability protection that comes in the form of a physical device rather than software installed on a computer system’s hardware. It also refers to the protection... Read more »

Are AI agents a blessing or a curse for cyber security?

Agentic AI is touted as a helpful tool for managing tasks, and cyber criminals are already taking advantage. Should information security teams look to AI agents to keep up? Read more »

Teen hackers charged over Scattered Spider attack on TfL

Two men have appeared in court in London in connection with the September 2024 cyber attack that disrupted online services at Transport for London Read more »

Should you run VMware 7 unsupported?

In just a few weeks, VMware version 7 reaches end of life, which means Broadcom will no longer issue patches Read more »

Podcast: Data sovereignty and what you need to do about it

Patrick Smith, EMEA CTO of Pure Storage, talks about data sovereignty, what’s driving heightened interest in it, and how customers, the tech industry and states are preparing for it Read more »

Heightened global risk pushes interest in data sovereignty

Survey finds all those questioned have looked at data location, with most recognising the need to plan for data sovereignty or risk severe damage to reputation and customer trust Read more »

Microsoft scores win against Office 365 credential thieves

Microsoft’s Digital Crimes Unit disrupts a major phishing-as-a-service operation that targeted and stole Office 365 usernames and credentials Read more »

Lufthansa pilots EU Digital Identity Wallet-based travel

Travellers will only be required to tap their phone to pass the various steps of checking in and boarding aircraft Read more »

Hamas lawyer challenges police after they seized legal files from phone in Schedule 7 stop

A UK solicitor hired by Hamas to challenge its proscription in the UK as a terrorist organisation argues police acted unlawfully by seizing a phone containing confidential legally privileged... Read more »

NCC: How RaaS team-ups help Scattered Spider enhance its attacks

Scattered Spider’s alliances with ransomware-as-a-service gangs act as a force multiplier for the scope, and number, of its cyber attacks, according to NCC Group analysts Read more »
Subscribe to our Newsletter