cybersecurity

Burnout burden: why CISOs are at breaking point, what needs to change

Let’s face it, no one talks about burnout in cybersecurity until it’s already too late. The pressure for CISOs and security leaders has been quietly mounting for years. Late nights, increasing number of incidents, shrinking budgets, ever changing landscape of regulations and threats and the constant expectation to be everywhere and be across everything. They’re…

Burnout burden: why CISOs are at breaking point, what needs to change Read More »

5 Things You Should Never Ask ChatGPT To Do

Alexsl/Getty Images When OpenAI first launched ChatGPT in November 2022, it quickly became the biggest chatbot in the world. Users initially rushed to ask the platform a variety of questions, but it’s become increasingly clear that are some things you should never ask ChatGPT to do. Although ChatGPT excels at tasks like question answering, text…

5 Things You Should Never Ask ChatGPT To Do Read More »

Apple Warned Iranian Dissidents Of iPhone Spyware Attack Months Before War Erupted

D3sign/Getty Images A new report from Bloomberg reveals that in the months leading up to the recent Israel-Iran war, there was a concerted and sophisticated effort to hack iPhones belonging to Iranians living within Iran and abroad. More than a dozen individuals were targeted, some of whom received messages from Apple alerting them to the…

Apple Warned Iranian Dissidents Of iPhone Spyware Attack Months Before War Erupted Read More »

House of Representatives bans WhatsApp on government-issued devices

Citing security concerns, the chief administrative officer (CAO) of the House of Representatives today issued an order prohibiting representatives and staff members from using WhatsApp on government-issued devices. This includes smartphones along with laptop and desktop computers. Further, any individuals with WhatsApp already installed on a device must delete it. Using web-based versions of the…

House of Representatives bans WhatsApp on government-issued devices Read More »

Fortifying retail: how UK brands can defend against cyber breaches

The recent wave of cyber attacks targeting UK retailers has been a moment of reckoning for the entire retail industry. As someone who went through supporting one of the largest retail breaches in history, this news hits close to home. The National Cyber Security Centre’s (NCSC) call to strengthen IT support protocols reinforces a hard…

Fortifying retail: how UK brands can defend against cyber breaches Read More »

Fortifying the future: The pivotal role of CISOs in AI operations

By Published: 04 Jun 2025 The widespread adoption of artificial intelligence (AI) applications and services is driving a fundamental shift in how chief information security officers (CISOs) structure their cyber security policies and strategies. The unique characteristics of AI, its data-intensive nature, complex models, and potential for autonomous decision-making introduce new attack surfaces and risks…

Fortifying the future: The pivotal role of CISOs in AI operations Read More »

Zero-trust is redefining cyber security in 2025

Cyber security has long been likened to building a fortress: thick walls, watchtowers, and a moat separating the inside from the outside. This perimeter-focused approach thrived for decades, but in today’s hyper-connected digital world, resources and users extend beyond traditional fortress boundaries, providing attackers with expanded opportunities for engagement. Recent cyber attacks have only underscored…

Zero-trust is redefining cyber security in 2025 Read More »

184 million logins exposed in ‘dream come true for cyber criminals’

More and more of our personal data seems to leak online with each passing day, and while it’s easy to become numb to that reality, some data breaches are more concerning than others. To that point, the discovery of a publicly exposed database by cybersecurity researcher Jeremiah Fowler of Website Planet this week is one…

184 million logins exposed in ‘dream come true for cyber criminals’ Read More »

Bridging Borders: The rise of Ukrainian-British tech collaboration

The past year has been crucial for Ukrainian-British tech cooperation. As one of the leading IT service exporters, Ukraine’s presence in the UK has never been stronger, with business ties growing deeper. Recently, the IT Ukraine Аssociation (ITU) published a comprehensive report on the state of the Ukrainian tech ecosystem. According to the report, Digital…

Bridging Borders: The rise of Ukrainian-British tech collaboration Read More »

Taking a ‘good enough’ approach with cloud security isn’t enough

Thanks to cloud computing, organisations of all shapes and sizes have benefitted from the flexibility of IT capacity without the cost and challenges of maintaining their own infrastructure. Hyperscale public cloud providers and SaaS tools to help with a vast array of business processes have been a particular boon for small and fast-growing organisations, helping…

Taking a ‘good enough’ approach with cloud security isn’t enough Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top