ReliaQuest researchers present new evidence that firms up a potential link, or outright partnership, between the ShinyHunters and Scattered Spider cyber gangs. Read more »
Mimecast identifies a phishing campaign targeting UK organisations that sponsor migrant workers and students, opening the door to account compromise and visa fraud Read more »
Workday research finds 75% of workers like AI as a teammate, but only 30% want AI to be the boss. Trust in the technology may grow with use, but... Read more »
The role of the chief information security officer has evolved dramatically over the years – and will continue to do so. What should boards really looking for when hiring... Read more »
Computer Weekly gets under the skin of an ongoing wave of ShinyHunters cyber attacks orchestrated via social engineering against Salesforce users Read more »
Traditional security measures may not be able to cope with the AI reality. In order to safeguard enterprise operations, reputation and data integrity in an AI-first world, security leaders... Read more »
Dame Muffy Calder is chair of the Technical Advisory Panel (TAP), a small group of experts that advises the Investigatory Powers Commissioner on surveillance technology. Do they have what... Read more »
The three lines model is a risk management approach to help organizations identify and manage risks effectively by creating three distinct lines of defense. Read more »
As OpenAI’s latest large language model delivers smarter AI, experts are wary of the risks GPT-5 poses to human creativity Read more »
Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization’s security, risk tolerance profile and strategic decisions. Read more »