News

An Unlikely Source Of Talent? The skills enabling successful video gamers align with those required by cybersecurity professionals. By Shlomie Liberow ...
GraphRag: Overcoming challenges of integrating Large Language Models as reliable elements of the cyber defence community. By Dominik Tomicevic ...
Report highlights Managed Detection & Response as the key to effective cybersecurity in protecting user identities against attacks.
BMW Financial Services USA has been caught out in a third-party data breach involving a financial services supplier.
Every organization that handles personal data is being trusted to protect it - a trust should be treated with care. By Wouter Klinkhamer ...
AI is being weaponized by fraudsters who train bots to mimic user behaviour with high precision. By Chad Kinlay ...
If organisations don’t have a live picture of their digital environment, then they are already vulnerable.  By Dan Jones ...
Decommissioned nuclear sites need to be treated with the same level of security rigour as operational ones. By James Neilson ...
By embedding security into DevOps processes, organisations can reduce risk, maintain compliance & build digital services.
A breach in connected devices or automated decision-making have risky consequences. Q&A with Dr Francesca Boem ...
N. Korean hackers blend social engineering, novel persistence mechanisms & cross-platform coding to infiltrate their targets.
Advanced Attack Vectors. GenAI faces threats like prompt injection (manipulating model behavior), data poisoning (tampering with training data), and model extraction (stealing proprietary capabilities ...