Taking a ‘good enough’ approach with cloud security isn’t enough

In the wake of the January 2025 ‘Codefinger’ attacks against AWS S3 users, Thales Rob Elliss argues that many organisations are dropping the ball when it comes to their... Read more »

Apple’s appeal to the Investigatory Powers Tribunal over the UK’s encryption ‘back door’ explained

Read more »

Apple’s appeal to the Investigatory Powers Tribunal over the UK’s encryption ‘backdoor’ explained

Apple has appealed to the Investigatory Powers Tribunal over an order by home secretary Yvette Cooper to give the UK access to customers’ data protected by Advanced Data Protection... Read more »

What is a uniform resource identifier (URI)?

Read more »

Keysight introduces AI network architecture validation, optimisation tool

Read more »

What is an initialization vector?

Read more »

Gmail ‘bubble’ encryption may be an S/MIME killer, says Google

Read more »

Top 1,000 IT service providers in scope of UK cyber bill

Read more »

What is a hacker?

Read more »

Countering nation-state cyber espionage: A CISO field guide

Read more »
Subscribe to our Newsletter