Cyber security models are currently focused on securing relatively static ring-fenced environments of centrally-hosted services. Organisations now face the challenge of transforming those models to manage fluid and scalable environments where their... Read more »
Nataraj Nagaratnam, IBM fellow and cloud security CTO, has been with the supplier for nearly 25 years. Security has been his forte throughout this time, whether it be cloud security, hybrid cloud... Read more »
Endpoint detection and response (EDR), multifactor authentication (MFA) and privileged access management (PAM) have long been the three tools most commonly required by cyber insurers when issuing policies, but a report compiled... Read more »
A total of 91 new victims were added to the Clop (aka Cl0p) ransomware leak site during March 2023, more than 65% of the total number of victims published between August 2020... Read more »
A newly detected ransomware dubbed Rorschach – so named because everybody who examined it “saw something different” – is being flagged by researchers at Check Point as an emergent and highly dangerous... Read more »
Genesis Market, one of the largest global suppliers of stolen personal data to the cyber criminal underground, has been taken down and more than 120 arrests made in Operation Cookie Monster, a... Read more »
A sudden ban on the use of ChatGPT by the Italian data protection authority has divided artificial intelligence (AI) and data privacy experts over whether or not officially restricting the use of... Read more »
The UK’s Information Commissioner’s Office (ICO) has imposed a £12.7m fine on video-sharing social media platform TikTok for unlawful collection and use of data on children under 13 years of age. The... Read more »
The UK’s newly created offensive cyber unit, the National Cyber Force (NCF), has carried out daily hacking operations to counter sophisticated cyber threats and disrupt state disinformation campaigns and terrorist groups, it... Read more »
Trellix researchers have shared the details of a Royal ransomware attack on one of its customers, revealing insight into the tactics, techniques and procedures (TTPs) employed by one of the world’s most... Read more »