ISO 27001

CCS under fire over ‘anti-SME’ supplier requirements for G-Cloud 15

The Crown Commercial Service (CCS) stands accused of making parts of its flagship cloud computing framework, G-Cloud, inaccessible to small and medium-sized enterprises (SMEs) and the hyperscalers, having set out a series of enhanced participation requirements for its cloud hosting lots. Government procurement chiefs began the invitation to tender (ITT) part of the procurement process…

CCS under fire over ‘anti-SME’ supplier requirements for G-Cloud 15 Read More »

CISOs: Don’t block AI, but adopt it with eyes wide open

The introduction of generative AI (GenAI) tools like ChatGPT, Claude, and Copilot has created new opportunities for efficiency and innovation – but also new risks. For organisations already managing sensitive data, compliance obligations, and a complex threat landscape, it’s essential not to rush into adoption without thoughtful risk assessment and policy alignment. As with any…

CISOs: Don’t block AI, but adopt it with eyes wide open Read More »

Secure software procurement in 2025: A call for accountability

The software security landscape is at an interesting juncture. As Jen Easterly, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), pointed out, there is a lesson to be drawn from the automotive industry of the 1960s. Its approach to improving car safety by building better designs – including seatbelts, crumple zones, and…

Secure software procurement in 2025: A call for accountability Read More »

Vigilance advised if using AI to make cyber decisions

As tech ecosystems become more interconnected and data is exchanged more frequently, the complexity of the cyber landscape has significantly grown, making it incredibly challenging to manage using existing cyber security tools and resources. Consequently, the task of enhancing cyber security has surpassed human-scale capabilities. Artificial intelligence (AI) and machine learning (ML) driven tools and…

Vigilance advised if using AI to make cyber decisions Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top