It takes a breach to force boards to take notice of cyber, says UK government

Business leaders across the UK are, by and large, failing to account for cyber security risk, and only seem to appreciate the need to have appropriate protections in place in the wake... Read more »

Ukraine war drives DDoS attack volumes ever higher

The number of observed distributed denial-of-service (DDoS) attacks nearly trebled during the first six months of 2022, with tit-for-tat hits by threat actors aligned with Russia and Ukraine driving much of the... Read more »

GPS tagging of migrants breaches UK data protection law, says Privacy International complaint

Privacy International has filed complaints with the Information Commissioner’s Office (ICO) and the Forensic Science Regulator (FSR) over the Home Office’s use of GPS tags to monitor migrants released on immigration bail.... Read more »

Why you should start your post-quantum encryption migration now

Firms should already be aware that quantum computing threatens to break the encryption that underpins all current digital interactions. That was already a significant challenge requiring focused attention, but recent developments have... Read more »

South Staffs Water is victim of botched Clop attack

South Staffordshire Plc, the parent company of utilities Cambridge Water and South Staffordshire Water, has reassured its 1.6 million customers that their water supplies are safe following an apparent Clop (aka Cl0p)... Read more »

Why organisations need to harmonise their CIO and CISO roles

The chief information officer (CIO) is a corporate executive in charge of IT strategy and implementation in an organisation. Conversely, the chief information security officer (CISO) is a senior-level executive responsible for... Read more »

tailgating (piggybacking)

What is tailgating (piggybacking)? Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises. Understanding tailgating... Read more »

Report reveals consensus around Computer Misuse Act reform

Cyber security experts and professionals are broadly aligned on questions of legitimacy and legality when it comes to some instances of unauthorised access to IT systems, according to a report produced by... Read more »

Cyber criminal forum targets only Russia

Researchers at Digital Shadows’ Photon Research Team have this week published information on an underground Russian language cyber criminal forum that stands out from the crowd for a new, but not altogether... Read more »

Microsoft doles out $13.7m in bug bounties

Microsoft has paid out a total of $13.7m (£11.3m, €13.3m) in bug bounties over the past 12 months, with 330 researchers from 46 countries acknowledged for their assistance in discovering and reporting... Read more »