risk management

Navigating the practicalities of AI regulation and legislation

Misusing artificial intelligence (AI) can have some very clear and expensive consequences. Movie studio Lionsgate recently joined a long list of organisations discovering that quotations and citations from generative AI (GenAI) systems need to be verified like any other source; Microsoft is being sued by a German journalist after Bing Copilot suggested he had committed crimes…

Navigating the practicalities of AI regulation and legislation Read More »

CISOs: Don’t rely solely on technical defences in 2025

Threats have been more sophisticated, unpredictable and harder to pin down. Attackers don’t just exploit technical weaknesses – they target human behaviour, organisational blind spots, and even regulatory loopholes. From spear phishing and deepfake fraud to misinformation generated by artificial intelligence (AI), cyber criminals are using emerging technologies to launch attacks with precision and ease.…

CISOs: Don’t rely solely on technical defences in 2025 Read More »

Overcoming the cyber paradox: Shrinking budgets – growing threats

Recent years have seen a general cost-cutting in organisations caused by economic pressures. Many organisations have seen a fall in customer demand due to the cost-of-living crisis, as well as inflationary pressures affecting costs. Higher interest rates, increasing organisations’ cost of capital, are another factor. There’s also a sense of fatigue associated with spending on…

Overcoming the cyber paradox: Shrinking budgets – growing threats Read More »

Government issues strategic priorities for online safety regulator Ofcom

The UK government has issued a draft of its strategic priorities for Ofcom under the Online Safety Act (OSA), which the regulator will have to consider when it starts enforcing the new rules from spring 2025. Passed in October 2023, the obligations placed on digital platforms by the OSA mean they must prevent children from…

Government issues strategic priorities for online safety regulator Ofcom Read More »

China’s Volt Typhoon rebuilds botnet in wake of takedown

The Chinese state threat actor most famously known as Volt Typhoon is staging a significant comeback after its botnet infrastructure was disrupted in a US-led takedown at the beginning of February 2024. Volt Typhoon’s malicious botnet comprised hundreds of Cisco and Netgear small and home office (SOHO) routers that had reached end-of-life (EOL) status and…

China’s Volt Typhoon rebuilds botnet in wake of takedown Read More »

EMEA businesses siphoning budgets to hit NIS2 goals

With the European Union’s (EU) NIS2 regulations now in full effect, IT leaders across the region report that they are struggling to secure budget to support their compliance efforts, with 95% reporting they are being forced to dip into funds reserved for other things. This is according to a Censuswide study of EMEA IT leaders…

EMEA businesses siphoning budgets to hit NIS2 goals Read More »

Data classification: What, why and who provides it

When it comes to managing data, we need to know where it is – but we also need to know what it is. With the rise in regulatory controls, enterprises now pay more attention to data sovereignty, especially when it comes to data in the cloud, but to know exactly what information they hold is…

Data classification: What, why and who provides it Read More »

EU cyber security bill NIS2 hits compliance deadline

The European Union’s (EU) landmark cyber security bill NIS2 has come into full force, meaning companies must now comply with its requirements or face hefty fines. Under the directive, which aims to harmonise cyber security rules and procedures across the bloc, EU-based businesses operating in critical sectors – including energy, transport, water, financial services and healthcare…

EU cyber security bill NIS2 hits compliance deadline Read More »

Cyber firms need to centre their own resilience

Information security is essentially an information risk management discipline. By rendering many information systems inoperable, the global outage precipitated by Crowdstrike prevented several companies from accessing critical business information due to unplanned and extended downtime. The unavailability was not only to information systems, but also to related information processing. It was not only an information…

Cyber firms need to centre their own resilience Read More »

Q&A: Adalbjorn Thorolfsson on IT project management in Iceland

The Icelandic Project Management Association was founded in 1984 by engineers and, as such, was initially focused on engineering projects. As project management evolved and became used in more sectors, such as information technology, healthcare, finance and the public sector, the composition of the members of the association and the board changed accordingly. Adalbjorn Thorolfsson…

Q&A: Adalbjorn Thorolfsson on IT project management in Iceland Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top