Cyber governance practices are maturing – and reshaping leadership expectations

How technology leaders can help organisations shape their cyber governance practices and strengthen their collaboration across the executive team Read more »

GDPR’s 7th anniversary: in the AI age, privacy legislation is still relevant

Seven years after GDPR reshaped data protection, AI is forcing a fresh look at governance. GDPR’s principles remain critical, guiding ethical AI use, risk management, and trusted innovation Read more »

International AI Alignment effort tackles unpredictability

Given AI systems are probabilistic, a group of international experts are collaborating to ensure such systems operate in the best interest of society Read more »

Senator warns of new UK surveillance risks to US citizens following Apple ‘backdoor’ row

US lawmaker calls for the US to publish an assessment of the risks posed by UK surveillance laws to US citizens in the wake of disclosures that the UK... Read more »

Senator warns of new UK surveillance risks to US citizens following Apple ‘back door’ row

US lawmarker raises concerns that UK may have ordered Google to introduce ‘backdoors’ into end-to-end encrypted back-ups impacting billions of Android phone users Read more »

Austrian government faces likely legal challenge over state spyware

Civil society groups are talking to opposition MPs about bringing a legal challenge to the Austrian constitutional court over ‘state trojan’ law Read more »

Global cyber spend will top $200bn this year, says Gartner

Worldwide spending on cyber security will hit another record high in 2025, and will go higher still next year Read more »

Burnout burden: why CISOs are at breaking point, what needs to change

CISOs face growing burnout as their roles expand beyond security, with high stress, low organisational authority, and short tenure. AI can help but change requires autonomy Read more »

What is an input validation attack?

An input validation attack is any malicious cyberattack that involves an attacker manually entering strange, suspicious or unsafe information into a normal user input field of a target computer... Read more »

What is good automated manufacturing practice (GAMP)?

Good automated manufacturing practice (GAMP) is a set of guidelines for pharmaceutical manufacturers. Read more »
Subscribe to our Newsletter