Technology, regulation and the human touch: three pointers to stop cyber-crime
Geopolitical tensions, rapid advances in computing technology and the accelerated pace at which we live our lives online are raising
Read moreGeopolitical tensions, rapid advances in computing technology and the accelerated pace at which we live our lives online are raising
Read morePhishing, a deceptive practice where cybercriminals impersonate legitimate entities to extract sensitive information, has been a significant threat in the
Read more2023 has been another transformative year for the cyber security industry. The advent of AI has brought significant advantages to
Read moreWhether it’s a global enterprise redefining a business process using cloud computing and machine learning or a sole trader setting
Read moreCybersecurity is all about protecting digital assets from unauthorized access and attacks. In today’s digital age, safeguarding sensitive information is
Read moreESG (Environmental, Social, and Governance) policies tend to be viewed as being predominantly concerned with climate change and the social
Read moreIn this podcast episode, Philippa Jefferies is joined by Alex Leadbeater, Chair of ETSI TC Cyber, David Boswarthick, Director of
Read moreBias in artificial intelligence (AI) is one of the technology’s most prominent issues. Stories of AI repeating and even exaggerating
Read moreSupply chain attacks are on the increase. The SANS Institutes supply chain security webcast states that as of today there is a
Read moreShadow APIs (Application Programming Interfaces) are now the biggest threat facing API security today. Analysis of more than 20 billion transactions from the first half of 2022 found 16.7 billion of these were malicious in nature and the majority (5 billion) were against unknown, unmanaged and unprotected APIs, more commonly referred to as Shadow APIs.
Read more