compliance

Government using national security as ‘smokescreen’ in Apple encryption row

The government is using national security as a “smokescreen” to refuse to disclose how many technical capability notices (TCNs) it has issued to telecoms and internet companies to secretly gain access to users’ encrypted communications and data, and make other modifications to their networks, it was claimed last night. Senior Conservative MP David Davis told…

Government using national security as ‘smokescreen’ in Apple encryption row Read More »

Investor behaviour in the wake of cyber’s ‘black swan’ moment

A growing sense of uncertainty is taking hold as the UK faces two compounding pressures. On one hand, prolonged international trade negotiations are leaving many investors and business leaders feeling removed from decisions that impact their long-term strategies. On the other, a series of high-profile cyber attacks on UK  and global companies has cast doubt…

Investor behaviour in the wake of cyber’s ‘black swan’ moment Read More »

Cyber security beyond compliance: Why resilience is the new boardroom imperative

Cyber security has long been the concern of CIOs, CISOs, and compliance officers. It was a regulatory obligation for many boardrooms – tick the box, demonstrate due diligence, and move on. That approach is no longer tenable. In today’s threat landscape, cyber is not simply a technical risk – it’s a strategic, enterprise-wide concern with…

Cyber security beyond compliance: Why resilience is the new boardroom imperative Read More »

Apple encryption row: Does law enforcement need to use Technical Capability Notices?

How far are criminal investigations inhibited by the wide availability of end-to-end encryption (E2E)? The Home Office and UK law enforcement agencies think the problem is urgent, hence the politically tricky decision to use a little-known feature of the Investigatory Powers legislation – the Technical Capability Notice – to seek to impose back-door conditions on…

Apple encryption row: Does law enforcement need to use Technical Capability Notices? Read More »

Fortifying the future: The pivotal role of CISOs in AI operations

By Published: 04 Jun 2025 The widespread adoption of artificial intelligence (AI) applications and services is driving a fundamental shift in how chief information security officers (CISOs) structure their cyber security policies and strategies. The unique characteristics of AI, its data-intensive nature, complex models, and potential for autonomous decision-making introduce new attack surfaces and risks…

Fortifying the future: The pivotal role of CISOs in AI operations Read More »

Building the foundations: A national roadmap for digital identity and sovereign data

After months of missteps and confusion, the UK digital identity sector now has the clarity to move forward. Technology secretary Peter Kyle’s recent blog outlining the role of the private sector alongside his department’s work on the Gov.uk Wallet is a moment that demands open collaboration between government and industry. We have a lot to…

Building the foundations: A national roadmap for digital identity and sovereign data Read More »

CISOs: Don’t block AI, but adopt it with eyes wide open

The introduction of generative AI (GenAI) tools like ChatGPT, Claude, and Copilot has created new opportunities for efficiency and innovation – but also new risks. For organisations already managing sensitive data, compliance obligations, and a complex threat landscape, it’s essential not to rush into adoption without thoughtful risk assessment and policy alignment. As with any…

CISOs: Don’t block AI, but adopt it with eyes wide open Read More »

AI and compliance: What are the risks?

The rapid growth of artificial intelligence (AI), especially generative AI (GenAI) and chatbots, gives businesses a wealth of opportunities to improve the way they work with customers, drive efficiencies and speed up labour-intensive tasks. But GenAI has brought problems, too. These range from security flaws and privacy concerns to questions about bias, accuracy and even…

AI and compliance: What are the risks? Read More »

UK biometric surveillance exists in ‘legal grey area’

The UK’s patchwork approach to regulating biometric surveillance technologies is “inadequate”, placing fundamental rights at risk and ultimately undermining public trust, says the Ada Lovelace Institute (ALI). As UK public and private organisations rapidly expand their use of various biometric surveillance technologies, an analysis by the ALI has found that “significant gaps and fragmentation” in…

UK biometric surveillance exists in ‘legal grey area’ Read More »

AI compliance: Dealing with data change and proliferation

In this podcast, we talk to Mathieu Gorge, CEO of Vigitrust, about the compliance risks posed by data during artificial intelligence (AI) processing, and training in particular. The key challenges here are that as datasets are trained, more data is created, and it can be difficult to ensure that data is also compliant, especially as…

AI compliance: Dealing with data change and proliferation Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top