The disclosure of multiple impactful and, critically, widespread vulnerabilities and proof-of-concept (POC) exploits made August a busy month for patching, with urgent updates needed for users of Apple and Google products, while... Read more »
Youth charity The Prince’s Trust has teamed up with Adarma, an Edinburgh-based supplier of threat management services, to launch a scheme aimed at empowering 21- to 30-year-olds to pursue careers in cyber... Read more »
UK-based hospitality multinational IHG, the operator of hotel chains such as Crowne Plaza, Holiday Inn, Intercontinental and Kimpton, among many others, has confirmed it has been targeted by an as-yet unknown threat... Read more »
On 26 August this year, Montenegro’s state infrastructure was hit by an “unprecedented” cyber attack, and national government officials expressed alarm. “Certain services were switched off temporarily for security reasons, but... Read more »
“Is SAST done? DAST too? Great – we have DevSecOps!” I have heard this assertion recently more than I had expected. Moving to a DevSecOps approach is more than just doing code... Read more »
The CyberUp coalition, a group of businesses, trade associations, non-governmental organisations (NGOs) and lawyers drawn from across the cyber security community have called on the incoming prime minister Liz Truss to quickly... Read more »
Go-Ahead Group, one of the largest bus operators in the UK, with franchises covering cities including Brighton, Hull, London, Newcastle, Oxford and Plymouth, has confirmed it is dealing with a cyber attack... Read more »
Saudi Arabia is impacted by the same kinds of cyber attack as the rest of the world. But the geopolitical situation in the region means there is a different set of perpetrators... Read more »
To have created the position of vice-president of customer trust yourself just weeks before your organisation becomes the focus of a major cyber security incident demonstrates the kind of prescience that an... Read more »
Making and keeping a company’s IT infrastructure safe and secure from unauthorised intrusions or malicious actions has always been challenging. With the increased use of cloud computing, coupled with a need to... Read more »