UK public increasingly concerned over NHS data sovereignty

A series of damaging cyber incidents in which data was stolen or leaked from NHS organisations seems to have done little to dent public confidence in the health service’s ability to safeguard... Read more »

EU judgment sinks Meta’s argument for targeted ads

In a move thought likely to widen scrutiny of big tech companies and online platforms, the Court of Justice of the European Union (CJEU) has ruled that national anti-trust authorities can examine... Read more »

BlackCat gang claims cyber attack on Barts NHS Trust

The Russian-speaking ALPHV or BlackCat ransomware operation has named Barts NHS Trust on its dark web leak site, claiming to have exfiltrated 7TB of data from the group, but almost three days... Read more »

security token

What is a security token? A security token is a physical or wireless device that provides two-factor authentication (2FA) for users to prove their identity in a login process. It is typically... Read more »

NHS data stolen in Manchester Uni ransomware attack

The cyber criminal organisation behind the developing ransomware attack on the University of Manchester appears to have accessed and stolen personally identifiable information (PII) on over a million NHS patients whose data... Read more »

The time to implement an internal AI usage policy is now

The use of artificial intelligence (AI) in organisations is increasingly widespread, thanks to its ability to increase efficiency, reduce the time that needs to be dedicated to more menial tasks, and rapidly... Read more »

8 blockchain-as-a-service providers to have on your radar

Imagine if, 20 or even 30 years ago, companies could have realistically adopted cloud-based ERP. Packaged, server-based ERP software might never have been a thing — and small organizations might have had... Read more »

Navigating cyber security under ChatGPT

Balancing the risk and reward of ChatGPT – as a large language model (LLM) and an example of generative AI – begins by performing a risk assessment of the potential of such... Read more »

‘Shadow’ AI use becoming a driver of insider cyber risk

The explosion in the use of generative AI tools based on large language models (LLMs) will almost inevitably lead to multiple major insider data breach incidents within the next 12 months, threat... Read more »

Brits are using healthcare apps without proper checks

Using complex health apps without advice from medical professionals is equivalent to buying a random box of pills with no regulatory approval and hoping for the best, warns Organisation for the Review... Read more »