cybersecurity

Microsoft’s changes AI Recall feature after intense criticism

When Microsoft pulled back the curtain on Copilot Plus PCs in May, one announcement caught the eye of many cautious Windows users. One of the exclusive features coming to Copilot Plus PCs is called Recall, which uses artificial intelligence to take snapshots of the screen, store and analyze them locally, and then allow you to…

Microsoft’s changes AI Recall feature after intense criticism Read More »

Better hygiene may mitigate the need to ban ransomware payments

The general belief that a cyber breach is a matter of ‘if’ not ‘when’ means all organisations potentially face the highly unwelcome prospect of being infected by ransomware, with critical data and operational capabilities only being released following payment to the attacker. Handling a ransomware attack calls for the enterprise to weigh up the value…

Better hygiene may mitigate the need to ban ransomware payments Read More »

MGM faces £100m loss from cyber attack on its casinos

US leisure and hospitality giant MGM Resorts has confirmed that hackers stole the personal information of an unspecified number of its customer’s following an early September cyber attack that is expected to cost the company $100m. The 11 September cyber attack – perpetrated by the UNC3944 threat group, otherwise known as Scattered Spider, likely as…

MGM faces £100m loss from cyber attack on its casinos Read More »

Nominet and European counterparts link up on intelligence sharing

The UK’s internet domain registrar, Nominet, has joined up with its counterparts from across Europe to launch a top-level domain information sharing and analysis centre (TLD ISAC) with the aim of strengthening cyber security capabilities and resilience through increased collaboration among TLD operators. The other authorities joining Nominet to launch the European TLD ISAC are…

Nominet and European counterparts link up on intelligence sharing Read More »

Unconventional career: A Computer Weekly Downtime Upload podcast

Computer expert Junade Ali is known publicly for developing what is believed to be the first compromised credential checking protocol, which checks if a password has been used following a data breach. He admits his career in IT and cybersecurity has been somewhat non-traditional. After leaving school with no formal qualifications, Ali began his working…

Unconventional career: A Computer Weekly Downtime Upload podcast Read More »

NATO countries must coordinate their cyber forces to combat the Russian threat  

With Russia and China both in an expansionist mood, member countries have been trying to present a united front against possible adversaries. General Chris Cavoli has drawn up some 4,000 pages of regionalised military strategy. However, the main arena for conflict between NATO countries and their rivals has so far been confined to the digital…

NATO countries must coordinate their cyber forces to combat the Russian threat   Read More »

The problem with ‘secure’ messaging

From the shocking scoop of Matt Hancock’s Whatsapp messages to Boris’ reticence to share his messages, the use of secure messaging has become a hot topic. Although it may seem like a new trend, the recent stream of government-centred controversies are far from the first we’ve seen, nor are they the most costly. Last year…

The problem with ‘secure’ messaging Read More »

Future Cyber Threats: The four ‘horsemen of the apocalypse’

As a CISO and cyber specialist, I am often asked what I see as the big cyber threats of the future. Whilst I’m not a fan of crystal ball gazing for its own sake, nevertheless it can be helpful to think about what may be coming – and what we can do about it. So…

Future Cyber Threats: The four ‘horsemen of the apocalypse’ Read More »

Five non-traditional talent pools that will help CIOs plug skills gaps

The technology market continues to be hampered by severe skills gaps and talent shortages, a problem which shows no sign of abating. In the 2022 Nash Squared Digital Leadership report, 70% of digital leaders said skills shortages are preventing them from keeping up with the pace of change. Everything from data analysts to cybersecurity specialists…

Five non-traditional talent pools that will help CIOs plug skills gaps Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top