Bug bounties have become a staple of the cyber security toolkit, offering researchers a way to get paid to find and report bugs and giving businesses a route to... Read more »
Critics and supporters of digital ID are honing their arguments for the government’s consultation – but it’s the public that will decide. How should you choose? Read more »
State-backed cyber threat actors from non-combatant states are taking advantage of the Israeli-US war on Iran to fulfil their own goals, according to Proofpoint analysts Read more »
Three-quarters of women working in security say they feel comfortable in the field, but women are still much more likely to be laid off and face persistent challenges around... Read more »
Salesforce warns users of an uptick in malicious activity targeting Experience Cloud customers with misconfigured user settings via an open source tool Read more »
In security, familiar testing and validation approaches are not enough when it comes to AI. The question is not just whether an AI-powered tool works but how it actually... Read more »
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and ‘integration theater, and how to protect unified platforms. Read more »
NHS analyst’s conviction for child sexual abuse offences raises concerns over unaudited access to patient data Read more »
As regional uncertainty rises, security leaders across the Gulf focus on resilience, faster incident response and deeper threat intelligence to protect critical systems and data Read more »
The Welsh government’s Tech Valleys programme is providing three-quarters of a million pounds to help reach thousands of primary school children with security education and careers guidance Read more »
