The Security Interviews: Jason Nurse, University of Kent

Jason Nurse, reader in cyber security at the University of Kent, discusses the psychological side of cyber and online safety, why placing blame on users as ‘the weakest link’... Read more »

Meet the deepfake fraudster who applied to work at a deepfake specialist

A recruiter at voice fraud specialist Pindrop had a shock when they came face-to-face with the same deepfake job candidate not once, but twice. Hear their story and learn... Read more »

One year on from the CrowdStrike outage: What have we learned?

A year has passed since the CrowdStrike outage caused widespread disruption to enterprise IT systems and infrastructure, but what – if anything – has been learned from the situation? Read more »

NCSC exposes Fancy Bear’s Authentic Antics malware attacks

Amid a new round of UK government sanctions targeting Moscow’s intelligence apparatus, the NCSC has formally attributed attacks orchestrated with a cleverly-designed malware to the GRU’s Fancy Bear cyber... Read more »

What is biometric authentication?

Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify their identity. Read more »

European cyber cops target NoName057(16) DDoS network

A Europol operation has succeeded in disrupting a pro-Russian hacktivist network accused of conducting DDoS cyber attacks on targets in Ukraine and Europe. Read more »

Estimated 96% of EMEA financial services sector not ready for DORA

Research from data backup provider Veeam indicates that vast majority of European financial services firms do not feel ready to meet the resiliency requirements of the EU’s DORA act Read more »

Co-op chief ‘incredibly sorry’ for theft of 6.5m members’ data

Co-op chief executive Shirine Khoury-Haq has revealed that all the personal data of all 6.5 million of its members was compromised in the April 2025 cyber attack on its... Read more »

Scattered Spider playbook evolving fast, says Microsoft

Microsoft warns users over notable evolutions in Scattered Spider’s attack playbook, and beefs up some of the defensive capabilities it offers to customers in response. Read more »

Forrester urges IT leaders to dump technical debt

IT needs to invest in innovative technologies and outsource legacy IT management to tackle volatile global markets, says Forrester Read more »
Subscribe to our Newsletter