The Framework Convention on AI is Coming: What Does it Mean for Your Organisation?
The speed at which AI innovation is moving has caught many by surprise. In some countries, lawmakers are struggling to keep up, oscillating between...
The speed at which AI innovation is moving has caught many by surprise. In some countries, lawmakers are struggling to keep up, oscillating between...
Ransomware is the cybersecurity story of the past decade. But over that time, adversary tactics, techniques, and procedures (TTPs) have continued t...
As guardians of highly sensitive personal information and world-class research, the UK’s higher education (HE) institutions are popular targe...
Managers play a unique role in their organisation—solving problems, managing risk and interfacing between senior leadership and rank-and-file emplo...
As elsewhere, data breach costs in the UK continue to rise. The latest (19th) edition of the IBM Cost of a Data Breach report puts the figure at $4...
Open-source dependencies have become a growing source of risk for organisations of all shapes and sizes. Log4j, xz Utils and other high-profile sto...
Data breach fines are on the rise. According to the ISMS.online State of Information Security Report 2024, the average fine amount responding busin...
In June this year, a mass extortion campaign against customers of data cloud specialist Snowflake was discovered. According to reports, victims wer...
NIS2 will be transposed into law across all EU member states in three months. It mandates enhanced baseline security, incident response, supply cha...
Every year, the cybersecurity industry comes together at Europe’s largest industry event: Infosecurity Europe. The scale of the show—at Londo...
In April, the government told us that half of UK businesses had suffered a breach over the previous 12 months, rising to even higher for medium (70...
The UK’s universities are being assailed from all sides. A report last year revealed that dozens of institutions had accepted at least £122m-156m f...
There’s more computing power in a single smartphone today than was available to mission control during the Apollo 11 moon landing. That’s the kind ...
Industry trends come and go. but one staple of the cybersecurity landscape over the past 17 years has been the Verizon Data Breach Investigations R...
For a useful annual snapshot into the security posture of UK businesses, look no further than the government’s Cyber security breaches survey. It p...
Financial services organisations have long been a target for threat actors. Whether they’re financially motivated groups looking for customers’ per...
On Good Friday, Microsoft developer Andres Freund dropped an Easter bombshell. Whilst troubleshooting some innocuous-looking performance issues on ...
Digital trust is the foundation on which modern organisations are built. It could be trust between employee and employer, between one organisation ...
There’s a growing problem at the heart of enterprise cybersecurity posture. It’s not shadowy cyber-criminals or state-backed hacktivists. It’s not ...
We’re used to hearing how the traditional network perimeter is dead. That the advent of cloud apps, home working and ubiquitous mobile devices has ...
In the digital world, trust is hard won and easily lost. Part of the reason for this is the lack of a universally understood and credible security ...
There was a time when cybersecurity was very much viewed as a technology function. No longer. Governments and regulators across the globe are incre...
Privacy and data protection were catapulted into mainstream consciousness with the advent of the GDPR in 2018. Since then, consumers have demanded ...
Company number: 04922343
Nile House, Nile Street, Brighton, England, BN1 1HW