With a rapidly changing cybersecurity environment, threat intelligence can lead the way to a more agile framework.
This is a guest post by Gaurav Chhiber, vice-president of Asia-Pacific and Japan at IronNet Cybersecurity The recent and unfolding news about the Russ...
The UK government is searching for a new information commissioner with an updated remit to use data to support growth and innovation, and plans on rea...
Agility is the latest buzzword, but what is it, and how can businesses create it?
Zero trust is the best way to shield against modern threats, experts claim.
Mobile security is at the top of every company's worry list these days — and for good reason: Nearly all workers now routinely access corporate data f...
The UK cybersecurity industry is heavily concentrated. Only 150 suppliers, employing 2/3rd of the work force are large enough to provide realistic in-...
How did ransomware evolve from random, spray and pray nuisance to the destructive behemoth it is today?
It also seeks assurance that the disclosure of protected information is permitted for the purposes of giving effect to the exercise of the OAIC's priv...
Three predictions for a future of actionable insights.
NCSC self-assessment tool launched to help sole traders and micro-businesses tackle their cyber security challenges
Npower customers will have to log in to their accounts on its website after its app was withdrawn following a security breach
Enterprise architects will play a vital role in business recovery, as key enablers of strategic decisions.
Organizational culture is built from the top down, and the ground up simultaneously: Security in the remote working landscape is no different.
Scammers are moving away from targeting businesses for huge amounts of money in favour of 'silent stealing': attempting to con individuals out of low...
Distributor Nuvias Group shares channel research that reveals many are expecting decent growth in 2021
The publication of two draft data adequacy decisions brings the UK closer to a final positive decision, which will enable the continued free flow of d...
US will take action to modernise its defences in the wake of the SolarWinds attack, says US government cyber lead Anne Neuberger
It's not a surprise that a company should want to spread its bets and adopt a multicloud strategy. But it gets more complicated in the automotive sect...
As the threat landscape continues to evolve, security environments grow in complexity, and the skills gap widens, security teams need to come up with...
The telecom giant said that it will offer three new SD WAN managed services offerings.
The data lake is a fundamental concept of data management. But what type of storage do you need to build a data lake on and what are the pros and cons...
The US DOJ described the North Korean hackers as "the world's leading bank robbers" and "a criminal syndicate with a flag."
More organizations are turning to technology to monitor staff while working from home. What does this mean for employee privacy in the new remote-work...
The pandemic has highlighted the value of soft skills, rather than technical ones, in security
The Covid-19 pandemic has had an impact on the prevalence of certain vulnerabilities in the wild, according to a report
Wrightington, Wigan and Leigh NHS Foundation Trust turned its use of BI apps from Qlik to rapid effect during the Covid-19 public health emergency
The Cancer Council in New South Wales has integrated its core systems to eliminate data silos and improve productivity
With concern about cloud spending on the rise, more professionals begin to devote part of their jobs to containing it. 'The dirty little secret of clo...
While dating apps are a simple click away on the app stores, as soon as you download them, they become a treasure trove of personal information that c...
Industry clouds like healthcare and retail are there for Microsoft partners to build services on top of.
Here are 10 monitors covering a range of sizes, price points and specifications that will make remote working more productive and more ergonomic.
The traditional network perimeter is dissolving, and it's far more difficult to tell who and what can be trusted.
The former head of the NCSC recently called for a dialogue over whether or not it is time to ban insurers from covering ransomware payments. Is he on...
Microsoft is planning to add a new 'Teams Pro' plan to Microsoft 365 and Office 365 business accounts which will bring webinar and more meeting intell...
Managing threat intelligence is like walking on a tightrope. To stay steady, you have to maintain balance between too little intelligence and too much...
Dean Porter, UK and Ireland country sales manager for corporate sales at F-Secure, reveals his passion for Chelsea FC and his appreciation for hip hop
UK telco taps global mobile virtual network enabler service provider, offering cloud-based real-time communications platforms, to assist in on-boardin...
As data breaches are now common, acceptance now lessens the impact on share prices.
Eight arrests have been made in England and Scotland in connection with a series of Sim-swapping attacks targeting high-profile victims
Damage from data breaches goes far beyond the impact to the target organisation – an obvious fact that is too often overlooked, says F-Secure
Nearly nine in 10 organisations in Singapore are using cloud services but cost and security concerns remain
Leaders must rethink the way they’re incorporating data-driven decision-making into all levels of their organizations.
Sweden becomes latest Nordic state to establish a national cyber security centre as the threat landscape grows
What will your worklife be like years from now? Today's work-from-home world has given us a glimpse of the future, as these five articles from CIO, Co...
As CIOs get down to deciding which projects are most important and most urgent, a common question arises: “How do we avoid speculative or unproven tec...
These are dark days for many businesses and individuals. But they’re salad days for...
A combination of factors is driving more companies to digital transformations within cloud-based...
The BlackBerry® Cylance® 2020 Threat Report contains a broad range of topics vital to the...
Software has transformed every business discipline. For companies trying to increase agility,...
Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization...