In the summer of 2021, analyst Gartner published its Market guide for security awareness computer-based training. It reported that the human element (85%) continues to be a primary catalyst for data breaches,... Read more »
What is Opex (operational expenditure)? Opex (operational expenditure) is the money a company or organization spends on an ongoing, day-to-day basis to run its business. These expenses can be one-time or recurring.... Read more »
Social media platform Reddit has moved to reassure its users that their data is secure, after a cyber attack on its systems that saw an unspecified threat actor gain unauthorised access to... Read more »
The UK government has sanctioned seven Russian cyber criminals associated with the Conti and Ryuk ransomware operations, freezing their assets and imposing travel bans, in a coordinated action with the US authorities.... Read more »
What is a digital footprint? A digital footprint — sometimes called a digital shadow — is the body of data that an individual creates through their actions online. Almost every online activity... Read more »
A change is underway in security training of all kinds. Security managers are being asked to step up and make a real difference in training; shape and support learning in more business-collaborative... Read more »
Scottish National Party MP Stewart McDonald has become the latest victim of a Russian state-backed hacking group that specialises in targeting non-government organisations (NGOs), politicians, journalists and other people of influence. Stewart... Read more »
A prolific cyber criminal who used encrypted social media platform Telegram in a series of long-running frauds has been sentenced at Croydon Crown Court to three years in prison for fraud by... Read more »
What is SOC 3 (System and Organization Controls 3)? A System and Organization Controls 3 (SOC 3) report outlines information related to a service organization’s internal controls for security, availability, processing integrity,... Read more »
The government has finally published its long-awaited response to its review of the Computer Misuse Act (CMA) of 1990 and opened a new consultation on proposed legislative changes, but has disappointed campaigners... Read more »