cybersecurity

Fortifying retail: how UK brands can defend against cyber breaches

The recent wave of cyber attacks targeting UK retailers has been a moment of reckoning for the entire retail industry. As someone who went through supporting one of the largest retail breaches in history, this news hits close to home. The National Cyber Security Centre’s (NCSC) call to strengthen IT support protocols reinforces a hard…

Fortifying retail: how UK brands can defend against cyber breaches Read More »

Fortifying the future: The pivotal role of CISOs in AI operations

By Published: 04 Jun 2025 The widespread adoption of artificial intelligence (AI) applications and services is driving a fundamental shift in how chief information security officers (CISOs) structure their cyber security policies and strategies. The unique characteristics of AI, its data-intensive nature, complex models, and potential for autonomous decision-making introduce new attack surfaces and risks…

Fortifying the future: The pivotal role of CISOs in AI operations Read More »

Zero-trust is redefining cyber security in 2025

Cyber security has long been likened to building a fortress: thick walls, watchtowers, and a moat separating the inside from the outside. This perimeter-focused approach thrived for decades, but in today’s hyper-connected digital world, resources and users extend beyond traditional fortress boundaries, providing attackers with expanded opportunities for engagement. Recent cyber attacks have only underscored…

Zero-trust is redefining cyber security in 2025 Read More »

184 million logins exposed in ‘dream come true for cyber criminals’

More and more of our personal data seems to leak online with each passing day, and while it’s easy to become numb to that reality, some data breaches are more concerning than others. To that point, the discovery of a publicly exposed database by cybersecurity researcher Jeremiah Fowler of Website Planet this week is one…

184 million logins exposed in ‘dream come true for cyber criminals’ Read More »

Bridging Borders: The rise of Ukrainian-British tech collaboration

The past year has been crucial for Ukrainian-British tech cooperation. As one of the leading IT service exporters, Ukraine’s presence in the UK has never been stronger, with business ties growing deeper. Recently, the IT Ukraine Аssociation (ITU) published a comprehensive report on the state of the Ukrainian tech ecosystem. According to the report, Digital…

Bridging Borders: The rise of Ukrainian-British tech collaboration Read More »

Taking a ‘good enough’ approach with cloud security isn’t enough

Thanks to cloud computing, organisations of all shapes and sizes have benefitted from the flexibility of IT capacity without the cost and challenges of maintaining their own infrastructure. Hyperscale public cloud providers and SaaS tools to help with a vast array of business processes have been a particular boon for small and fast-growing organisations, helping…

Taking a ‘good enough’ approach with cloud security isn’t enough Read More »

The need for secure data sharing: Lessons learned from public health

The escalating wave of cyber attacks targeting public and private sectors poses an unprecedented threat. This is readily apparent in healthcare, where securing patient data and building resilient systems is of the utmost importance. Across the UK, NHS trusts have repeatedly found themselves in the crosshairs of attackers, with dire consequences. A 2024 attack on…

The need for secure data sharing: Lessons learned from public health Read More »

DeepSeek R1 can generate more harmful content than other AI, study finds

Now that DeepSeek R1 is being used and tested in the wild, we’re finding out more details about the AI product that tanked the stock market on Monday while becoming the most popular iPhone app in the App Store. We already know that DeepSeek censors itself when asked about topics that are sensitive to the…

DeepSeek R1 can generate more harmful content than other AI, study finds Read More »

A guide to DORA compliance

The Digital Operational Resilience Act (DORA) came into force on 16 January 2023. Following a two-year implementation period, from 17 January 2025, financial organisations must fully comply with the new regulation, which aims to ensure they remain resilient to severe operational digital disruption. The act covers a number of aspects of cyber resiliency, auditability, and…

A guide to DORA compliance Read More »

Hackers are hijacking Chrome extensions in an attempt to steal your data

While you were wrapping presents or spending time with friends and family on Christmas Eve, hackers were busy looking for ways to steal your data. Reuters reports that multiple companies have seen their Chrome browser extensions hijacked by cybercriminals in recent days, such as the data protection company Cyberhaven on December 24.“On December 24, a…

Hackers are hijacking Chrome extensions in an attempt to steal your data Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top