Preparation and appreciation – the human factor in incident response

A typical incident response effort is highly technical, so where do soft skills come in and how do you know how effective your team is? We look at a... Read more »

What are the best practices for securing AWS tech stacks?

An AWS tech stack can aid business growth and facilitate efficient operations, but misconfigurations have become all too common and stall this progress Read more »

Microsoft raises posse to target dangerous Lumma malware

Microsoft, along with a consortium of partners, has seized and disrupted a significant part of the Lumma malware-as-a-service network used to steal data and funds Read more »

M&S cyber attack disruption likely to last until July

M&S says it has moved into recovery mode after a ransomware attack, but expects some disruption to persist throughout the coming weeks. Read more »

NCSC: Russia’s Fancy Bear targeting logistics, tech orgs

The NCSC and its partner agencies have blown the whistle on an extensive campaign of malicious cyber attacks orchestrated by the Russian state Fancy Bear operation. Read more »

NCSC: Russia’s Fancy Bear targeting logistics, tech organisations

The NCSC and its partner agencies have blown the whistle on an extensive campaign of malicious cyber attacks orchestrated by the Russian state Fancy Bear operation. Read more »

What is a passkey?

A passkey is an alternative user authentication method that eliminates the need for usernames and passwords. Read more »

Podcast: RSA 2025 – AI’s risk surface and the role of the CISO

We review RSA 2025 with Vigitrust CEO Mathieu Gorge who looks at the impacts on compliance of AI’s expanding risk surface, the role of the CISO, and a changed... Read more »

Capital One pushes out data tokenisation

Organisations using the Databricks and Snowflake platforms will be able to use Capital One’s Databolt tool to secure their data Read more »

Strong fintech security posture at risk via third-party weak links

Despite having a strong security posture, the financial technology sector could be open to attack via third parties Read more »
Subscribe to our Newsletter