An actively exploited type confusion vulnerability in the Google Chrome web browser needs immediate attention from users Read more »
A developing cyber attack at Australian airline Qantas that started at a third-party call centre is already being tentatively attributed to Scattered Spider. Find out more and learn about... Read more »
Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties. Read more »
The principle of least privilege (POLP) is a concept in computer security that limits users’ access rights to only what is strictly required to do their jobs. Read more »
Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate. Read more »
Dutch research reveals how cognitive biases can lead to catastrophic security decisions Read more »
Publishers and other providers of creative content now have the option to block AI crawlers from accessing and scraping their intellectual property with new tools from Cloudflare. Read more »
A threat actor, also called a malicious actor, is an entity that poses a security risk and seeks to cause harm to individuals, devices, networks or digital systems, often... Read more »
The ISO 31000 Risk Management framework is an international standard that provides organizations with guidelines and principles for risk management. Read more »
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data... Read more »
