What if your most valuable business assets were quietly being stolen in the shadows? Trade secret theft has surged in recent years, with advances in technology and the rise of cyber crime ...
Hackers are focused on penetrating critical infrastructure for potential future sabotage and steaing sensitive information.
Canada's main spy agency says it has has found evidence of the Indian government using illicit spyware to track & intercept Sikh separatists.
Smartphones, tablets and laptops are essential for communication, data access & collaboration but are equally attractive targets for cyberattacks.
Managing cyber risk is a powerful business enabler, helping businesses to become more efficient and more competitive.
As the Biden Presidency fades, the White House has issued a comprehensive new plan to harness Artificial Intelligence for national security.
The US government needs to move fast to build new computing infrastructure if it is to to keep pace with AI research and the related economic benefits.
One in five UK companies test their data recovery systems just once a year. Only 5% say they test monthly. By Stephen Young.
A campaign of attacks on local councils is thought to be part o part of Russia’s response to the UK’s growing involvement in the Ukraine war.
With the level of cyber threats so advanced, any weak spots in the code may result in exposed sensitive data & significant financial losses.
More than 50% of European cyber security professionals say their team is understaffed and struggling to manage growing workloads and they feel restricted and constrained. These European IT security ...
Business operating both regimes can expect to have to meet both UK & EU regulations and so will need to seek harmonization. by Innes Muir ...