Google fixes type confusion flaw in Chrome browser

An actively exploited type confusion vulnerability in the Google Chrome web browser needs immediate attention from users Read more »

Scattered Spider link to Qantas hack is likely, say experts

A developing cyber attack at Australian airline Qantas that started at a third-party call centre is already being tentatively attributed to Scattered Spider. Find out more and learn about... Read more »

What is quantum key distribution (QKD)?

Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties. Read more »

What is the principle of least privilege (POLP)?

The principle of least privilege (POLP) is a concept in computer security that limits users’ access rights to only what is strictly required to do their jobs. Read more »

What is business continuity software?

Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate. Read more »

Dutch study uncovers cognitive biases undermining cyber security board decisions

Dutch research reveals how cognitive biases can lead to catastrophic security decisions Read more »

Cloudflare to let customers block AI web crawlers

Publishers and other providers of creative content now have the option to block AI crawlers from accessing and scraping their intellectual property with new tools from Cloudflare. Read more »

What is a threat actor?

A threat actor, also called a malicious actor, is an entity that poses a security risk and seeks to cause harm to individuals, devices, networks or digital systems, often... Read more »

What is the ISO 31000 Risk Management standard?

The ISO 31000 Risk Management framework is an international standard that provides organizations with guidelines and principles for risk management. Read more »

Better governance is required for AI agents

The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data... Read more »
Subscribe to our Newsletter