risk management

US breach reinforces need to plug third-party security weaknesses

The finance sector has been dealt another reminder that security postures are only as strong as the weakest link, as a tech supplier hack leaves US banks exposed. This week, SitusAMC, which provides loans and mortgage services to US banks, admitted that “certain information” from its systems had been compromised in a cyber attack. SitusAMC…

US breach reinforces need to plug third-party security weaknesses Read More »

5 Of The Most Expensive NASA Space Missions In History

Tada Images/Shutterstock NASA has long captured the imagination of humanity with its ambitions. We reached the moon, built space stations, placed telescopes in orbit, and unlocked the secrets of the universe with NASA’s guidance. These achievements serve science, education, and inspire others, often yielding technologies that benefit life on Earth. At the same time, funding…

5 Of The Most Expensive NASA Space Missions In History Read More »

Dutch boardroom cyber security knowledge gap exposed

The Netherlands is preparing to implement the NIS2 directive, which will make boardroom executives personally liable for cyber security incidents. While the European deadline passed in October 2024, Dutch implementation has been delayed until early to mid-2026. However, according to Bibi van den Berg, professor of cyber security governance at Leiden University, the legislation will…

Dutch boardroom cyber security knowledge gap exposed Read More »

Government might support Jaguar Land Rover supply chain to mitigate cyber attack impact

The government is looking at ways to lessen the impact of the August 2025 cyber attack on Jaguar Land Rover’s (JLR’s) supply chain, amid claims of workers having to sign on for Universal Credit for lack of wages. Demands that JLR should itself support its supply chain more are also being heard from the public,…

Government might support Jaguar Land Rover supply chain to mitigate cyber attack impact Read More »

Over half of India-based companies suffer security breaches

Global supply chains could be vulnerable to attack through third-party suppliers in India, as a report reveals that over half suffered breaches in the country last year. According to research by SecurityScorecard, Indian companies across multiple sectors – including manufacturers supplying the aerospace and pharmaceuticals industries, as well as IT services firms – have security…

Over half of India-based companies suffer security breaches Read More »

Bridging the SLA gap: A guide to managing cloud provider risk

As organisations increasingly rely on cloud services to drive innovation and operational efficiency, chief information security officers (CISOs) face a persistent challenge: what happens when a cloud provider’s service level agreement (SLA) doesn’t align with your enterprise’s security and availability requirements? This scenario is more common than many leaders realise. Whether it’s a cutting-edge AI…

Bridging the SLA gap: A guide to managing cloud provider risk Read More »

Is it time to build an AI factory?

The digital skyline will be dominated by factories, artificial intelligence (AI) factories. That is if you believe the hype – but what is an AI factory, and how can organisations benefit from this industrial revolution of technology? Factories mass-produce the same product over and over again. In doing so, they cut the cost of production…

Is it time to build an AI factory? Read More »

European digital sovereignty: Storage, surveillance concerns to overcome

In mid-June 2025, Microsoft made an announcement about a suite of “Sovereign Cloud solutions” designed to ensure that data belonging to European customers remains stored and processed entirely within Europe. Judson Althoff, executive vice-president and chief commercial officer at Microsoft, said this “evolution and expansion” will be offered across all existing European datacentre regions, for…

European digital sovereignty: Storage, surveillance concerns to overcome Read More »

ISACA launches AI security management certification

Security professional association ISACA is to offer its member base of almost 200,000 accredited security professionals around the world access to a new certification, Advanced in AI Security Management (AAISM), covering the fast-emerging technology. A recent ISACA study revealed that 61% of security professionals were either very or extremely worried that generative artificial intelligence (GenAI)…

ISACA launches AI security management certification Read More »

NCSC updates CNI Cyber Assessment Framework

The UK’s National Cyber Security Centre (NCSC) has rolled out a series of updates to its Cyber Assessment Framework (CAF) aimed at assisting operators of Britain’s critical national infrastructure (CNI) in better managing their security risk profiles. The enhancements, which take CAF to version 4.0, place greater emphasis on several areas of cyber risk management…

NCSC updates CNI Cyber Assessment Framework Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top