risk management

Government might support Jaguar Land Rover supply chain to mitigate cyber attack impact

The government is looking at ways to lessen the impact of the August 2025 cyber attack on Jaguar Land Rover’s (JLR’s) supply chain, amid claims of workers having to sign on for Universal Credit for lack of wages. Demands that JLR should itself support its supply chain more are also being heard from the public,…

Government might support Jaguar Land Rover supply chain to mitigate cyber attack impact Read More »

Over half of India-based companies suffer security breaches

Global supply chains could be vulnerable to attack through third-party suppliers in India, as a report reveals that over half suffered breaches in the country last year. According to research by SecurityScorecard, Indian companies across multiple sectors – including manufacturers supplying the aerospace and pharmaceuticals industries, as well as IT services firms – have security…

Over half of India-based companies suffer security breaches Read More »

Bridging the SLA gap: A guide to managing cloud provider risk

As organisations increasingly rely on cloud services to drive innovation and operational efficiency, chief information security officers (CISOs) face a persistent challenge: what happens when a cloud provider’s service level agreement (SLA) doesn’t align with your enterprise’s security and availability requirements? This scenario is more common than many leaders realise. Whether it’s a cutting-edge AI…

Bridging the SLA gap: A guide to managing cloud provider risk Read More »

Is it time to build an AI factory?

The digital skyline will be dominated by factories, artificial intelligence (AI) factories. That is if you believe the hype – but what is an AI factory, and how can organisations benefit from this industrial revolution of technology? Factories mass-produce the same product over and over again. In doing so, they cut the cost of production…

Is it time to build an AI factory? Read More »

European digital sovereignty: Storage, surveillance concerns to overcome

In mid-June 2025, Microsoft made an announcement about a suite of “Sovereign Cloud solutions” designed to ensure that data belonging to European customers remains stored and processed entirely within Europe. Judson Althoff, executive vice-president and chief commercial officer at Microsoft, said this “evolution and expansion” will be offered across all existing European datacentre regions, for…

European digital sovereignty: Storage, surveillance concerns to overcome Read More »

ISACA launches AI security management certification

Security professional association ISACA is to offer its member base of almost 200,000 accredited security professionals around the world access to a new certification, Advanced in AI Security Management (AAISM), covering the fast-emerging technology. A recent ISACA study revealed that 61% of security professionals were either very or extremely worried that generative artificial intelligence (GenAI)…

ISACA launches AI security management certification Read More »

NCSC updates CNI Cyber Assessment Framework

The UK’s National Cyber Security Centre (NCSC) has rolled out a series of updates to its Cyber Assessment Framework (CAF) aimed at assisting operators of Britain’s critical national infrastructure (CNI) in better managing their security risk profiles. The enhancements, which take CAF to version 4.0, place greater emphasis on several areas of cyber risk management…

NCSC updates CNI Cyber Assessment Framework Read More »

Coding with GenAI: How businesses can manage the process

Developers often adopt generative AI (GenAI) because it helps them to code faster, yet the tooling has potential to expose organisations to unaccounted for risks – especially if use is unauthorised or best practice ignored. “With GenAI, we see both amazing results and stunningly stupid results for the same dev team, and that tells us…

Coding with GenAI: How businesses can manage the process Read More »

Government funding to help SMEs protect their IP

Up to 500 UK small and medium-sized enterprises (SMEs) are in line to pick up a share of a government funding package designed to support them in protecting their intellectual property (IP) from hostile actors, whether they be larger competitors or state-backed threat actors. In exchange for a £500 buy-in, the Secure Innovation Security Review…

Government funding to help SMEs protect their IP Read More »

UBS employee data leaked after cyber attack on supplier

The details of about 130,000 UBS staff were leaked after a cyber attack on a procurement service provider used by the Swiss banking giant. A private bank in Switzerland, known as Pictet, was also affected by the cyber attack on Chain IQ earlier this month, which saw hackers steal employee information. The hack, which included…

UBS employee data leaked after cyber attack on supplier Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top