A typical incident response effort is highly technical, so where do soft skills come in and how do you know how effective your team is? We look at a... Read more »
An AWS tech stack can aid business growth and facilitate efficient operations, but misconfigurations have become all too common and stall this progress Read more »
Microsoft, along with a consortium of partners, has seized and disrupted a significant part of the Lumma malware-as-a-service network used to steal data and funds Read more »
M&S says it has moved into recovery mode after a ransomware attack, but expects some disruption to persist throughout the coming weeks. Read more »
The NCSC and its partner agencies have blown the whistle on an extensive campaign of malicious cyber attacks orchestrated by the Russian state Fancy Bear operation. Read more »
The NCSC and its partner agencies have blown the whistle on an extensive campaign of malicious cyber attacks orchestrated by the Russian state Fancy Bear operation. Read more »
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords. Read more »
We review RSA 2025 with Vigitrust CEO Mathieu Gorge who looks at the impacts on compliance of AI’s expanding risk surface, the role of the CISO, and a changed... Read more »
Organisations using the Databricks and Snowflake platforms will be able to use Capital One’s Databolt tool to secure their data Read more »
Despite having a strong security posture, the financial technology sector could be open to attack via third parties Read more »