risk management

ISACA launches AI security management certification

Security professional association ISACA is to offer its member base of almost 200,000 accredited security professionals around the world access to a new certification, Advanced in AI Security Management (AAISM), covering the fast-emerging technology. A recent ISACA study revealed that 61% of security professionals were either very or extremely worried that generative artificial intelligence (GenAI)…

ISACA launches AI security management certification Read More »

NCSC updates CNI Cyber Assessment Framework

The UK’s National Cyber Security Centre (NCSC) has rolled out a series of updates to its Cyber Assessment Framework (CAF) aimed at assisting operators of Britain’s critical national infrastructure (CNI) in better managing their security risk profiles. The enhancements, which take CAF to version 4.0, place greater emphasis on several areas of cyber risk management…

NCSC updates CNI Cyber Assessment Framework Read More »

Coding with GenAI: How businesses can manage the process

Developers often adopt generative AI (GenAI) because it helps them to code faster, yet the tooling has potential to expose organisations to unaccounted for risks – especially if use is unauthorised or best practice ignored. “With GenAI, we see both amazing results and stunningly stupid results for the same dev team, and that tells us…

Coding with GenAI: How businesses can manage the process Read More »

Government funding to help SMEs protect their IP

Up to 500 UK small and medium-sized enterprises (SMEs) are in line to pick up a share of a government funding package designed to support them in protecting their intellectual property (IP) from hostile actors, whether they be larger competitors or state-backed threat actors. In exchange for a £500 buy-in, the Secure Innovation Security Review…

Government funding to help SMEs protect their IP Read More »

UBS employee data leaked after cyber attack on supplier

The details of about 130,000 UBS staff were leaked after a cyber attack on a procurement service provider used by the Swiss banking giant. A private bank in Switzerland, known as Pictet, was also affected by the cyber attack on Chain IQ earlier this month, which saw hackers steal employee information. The hack, which included…

UBS employee data leaked after cyber attack on supplier Read More »

Fortifying the future: The pivotal role of CISOs in AI operations

By Published: 04 Jun 2025 The widespread adoption of artificial intelligence (AI) applications and services is driving a fundamental shift in how chief information security officers (CISOs) structure their cyber security policies and strategies. The unique characteristics of AI, its data-intensive nature, complex models, and potential for autonomous decision-making introduce new attack surfaces and risks…

Fortifying the future: The pivotal role of CISOs in AI operations Read More »

Put ROCs before SOCs, Qualys tells public sector

The security operations centre (SOC) has served public sector cyber teams well over the years, but it is fundamentally a reactive tool, and now needs to be superseded by something else to address not just alerts about in-progress security events, but the underlying risks that lead to them, all in the service of “doing” cyber…

Put ROCs before SOCs, Qualys tells public sector Read More »

Zero-trust is redefining cyber security in 2025

Cyber security has long been likened to building a fortress: thick walls, watchtowers, and a moat separating the inside from the outside. This perimeter-focused approach thrived for decades, but in today’s hyper-connected digital world, resources and users extend beyond traditional fortress boundaries, providing attackers with expanded opportunities for engagement. Recent cyber attacks have only underscored…

Zero-trust is redefining cyber security in 2025 Read More »

What VMware’s licensing crackdown reveals about control and risk 

Over the past few weeks, VMware customers holding onto their perpetual licenses, which are often unsupported and in limbo, have reportedly begun receiving formal cease-and-desist letters from Broadcom. The message is as blunt as it is unsettling: your support contract has expired, and you are to immediately uninstall any updates, patches, or enhancements released since…

What VMware’s licensing crackdown reveals about control and risk  Read More »

How cyber security professionals are leveraging AWS tools

With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration for IT security teams and professionals. As such, AWS offers a broad range of cyber security tools to secure AWS-based tech stacks. They cover areas such as data privacy, access management, configuration management, threat detection,…

How cyber security professionals are leveraging AWS tools Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top