
Embracing innovation without compromising hybrid cloud security
AI demands speed and innovation, but without hybrid cloud visibility and security, risks escalate. Discover why deep observability is key to secure transformation.
AI demands speed and innovation, but without hybrid cloud visibility and security, risks escalate. Discover why deep observability is key to secure transformation.
Clientless ZTNA enables secure access to unmanaged IoT and OT devices, reducing malware risk and lateral movement while supporting third-party and BYOD network access.
The 2025 Cyber Breaches Survey exposes the UK’s widening cybersecurity gaps—underscoring urgent leadership, cultural, and supply chain vulnerabilities that demand immediate, coordinated action.
Hackers are evolving, leveraging AI and malware-as-a-service to target organisations. Matt Berzinski of Ping Identity explores how businesses can turn the tables on cybercriminals.
Cybersecurity audits help businesses identify vulnerabilities, assess vendor risks, and ensure compliance. They optimise security strategies, minimise wasted resources, and strengthen defenses against evolving cyber threats.
Cyber criminals are becoming increasingly intelligent in their attempts to trick security solutions and mechanisms in companies using special techniques to disguise their attacks and prevent them from being detected.
AI has the potential to revolutionise cybersecurity for Critical National Infrastructure (CNI), enabling smarter threat detection, operational resilience, and faster incident response in an evolving threat landscape.
UK and European companies are leveraging AI-powered identity verification and fraud detection solutions to combat cyberthreats like deepfakes, ensuring data security and building digital trust.
AI-powered cyberattacks are growing more sophisticated, but organisations can fight back using AI-driven zero trust security, minimising vulnerabilities and preventing lateral movement within systems.
Chris Perrin highlights the top 10 cybersecurity threats facing the UK financial services sector, including ransomware, supply chain vulnerabilities, and evolving regulatory challenges.
Insider threats are rising in financial services, costing organizations millions. Robust security measures and proactive monitoring are essential to mitigate these risks effectively.
The UK’s digital transformation centres on secure digital identity solutions, enhancing public services by simplifying access, ensuring privacy, and promoting inclusivity for all citizens in essential areas including healthcare and education.
European firms’ AI plans are at risk due to data infrastructure blind spots, with many prioritising recovery from cyberattacks over effective prevention and mitigation strategies.
Cyber deterrence shifts cybersecurity from reactive to proactive, disrupting attackers’ motives by targeting their incentives. The PARC Framework addresses profit, anonymity, repercussions, and costs, reducing attack likelihood.
Decentralised digital identities (DCI) promise enhanced security and user control. However, widespread adoption faces challenges, including the need for better education and clearer benefits.
The NIS 2 directive enhances cybersecurity in critical industries, requiring proactive compliance and better risk management to mitigate cyber attack risks and improve security standards.
Internationally renowned data scientist Anthony Scriffignano on the need to make AI investments with humility, pragmatic realism, and a readiness to persevere.
Ensure remote workforce security by avoiding common mistakes: device mismanagement, falling for phishing, neglecting updates, and skipping multi-factor authentication.
Ransomware’s perilous impact demands comprehensive mitigation. Understanding its mechanics and bolstering defences through strategic monitoring, employee training, and disaster recovery planning is paramount.
In the wake of AI’s dominance, the overlooked but crucial concern of Quantum Computing emerges, urging businesses to prepare promptly.
Explore strategies from Splunk’s Mick Baccio to tackle stress, foster team empowerment, and embrace AI in cybersecurity.
Explore the evolving human-AI relationship in 2024: upskilling with new AI regulation, reevaluating business plans, and addressing deepfake threats.
Explore parallels between Formula One strategies and cybersecurity challenges. Learn how continuous adaptation ensures optimal performance in both domains
Implemented in 2023, the EU-US Data Privacy Framework now faces a critical test in 2024 with activist Max Schrems’ challenge.
Green Flag is reconstructing its technology and operating model to offer an even better service to its customers.
Inside the ambitious transformation of Deutsche Telekom IT
Celonis co-founder Alexander Rinke on a tool which promises to eliminate one of the biggest capacity killers in business
Tech Mahindra gives insight into how two years of a global pandemic transformed the telecoms sector
DeepSeek’s open-source AI disrupts Silicon Valley’s dominance, promising efficiency but raising data privacy concerns. Explore its impact on AI democratisation, security risks, and ethical considerations.
Linguistic testing is key to setting up globalisation in a quality way, says NTT Data’s Pooja Tyagi
Jake Ring and GIGA Data Centers’ leadership team on how the startup aims to reinvent the colocation data centre market
This month, Ben, Rom and James discuss Sundar Pichai’s red-faced moment while on a call with Thierry Breton, along with the main themes of Europe v Big Tech. The trio also review our Lebara case study, while Ben interviews Anna Chung, a cyber threat research analyst.
AI demands speed and innovation, but without hybrid cloud visibility and security, risks escalate. Discover why deep observability is key to secure transformation.
Clientless ZTNA enables secure access to unmanaged IoT and OT devices, reducing malware risk and lateral movement while supporting third-party and BYOD network access.
The 2025 Cyber Breaches Survey exposes the UK’s widening cybersecurity gaps—underscoring urgent leadership, cultural, and supply chain vulnerabilities that demand immediate, coordinated action.
Hackers are evolving, leveraging AI and malware-as-a-service to target organisations. Matt Berzinski of Ping Identity explores how businesses can turn the tables on cybercriminals.
Cybersecurity audits help businesses identify vulnerabilities, assess vendor risks, and ensure compliance. They optimise security strategies, minimise wasted resources, and strengthen defenses against evolving cyber threats.
Cyber criminals are becoming increasingly intelligent in their attempts to trick security solutions and mechanisms in companies using special techniques to disguise their attacks and prevent them from being detected.
AI has the potential to revolutionise cybersecurity for Critical National Infrastructure (CNI), enabling smarter threat detection, operational resilience, and faster incident response in an evolving threat landscape.
UK and European companies are leveraging AI-powered identity verification and fraud detection solutions to combat cyberthreats like deepfakes, ensuring data security and building digital trust.
AI-powered cyberattacks are growing more sophisticated, but organisations can fight back using AI-driven zero trust security, minimising vulnerabilities and preventing lateral movement within systems.
Chris Perrin highlights the top 10 cybersecurity threats facing the UK financial services sector, including ransomware, supply chain vulnerabilities, and evolving regulatory challenges.
Insider threats are rising in financial services, costing organizations millions. Robust security measures and proactive monitoring are essential to mitigate these risks effectively.
The UK’s digital transformation centres on secure digital identity solutions, enhancing public services by simplifying access, ensuring privacy, and promoting inclusivity for all citizens in essential areas including healthcare and education.
European firms’ AI plans are at risk due to data infrastructure blind spots, with many prioritising recovery from cyberattacks over effective prevention and mitigation strategies.
Cyber deterrence shifts cybersecurity from reactive to proactive, disrupting attackers’ motives by targeting their incentives. The PARC Framework addresses profit, anonymity, repercussions, and costs, reducing attack likelihood.
Decentralised digital identities (DCI) promise enhanced security and user control. However, widespread adoption faces challenges, including the need for better education and clearer benefits.
The NIS 2 directive enhances cybersecurity in critical industries, requiring proactive compliance and better risk management to mitigate cyber attack risks and improve security standards.
Internationally renowned data scientist Anthony Scriffignano on the need to make AI investments with humility, pragmatic realism, and a readiness to persevere.
Ensure remote workforce security by avoiding common mistakes: device mismanagement, falling for phishing, neglecting updates, and skipping multi-factor authentication.
Ransomware’s perilous impact demands comprehensive mitigation. Understanding its mechanics and bolstering defences through strategic monitoring, employee training, and disaster recovery planning is paramount.
In the wake of AI’s dominance, the overlooked but crucial concern of Quantum Computing emerges, urging businesses to prepare promptly.
Explore strategies from Splunk’s Mick Baccio to tackle stress, foster team empowerment, and embrace AI in cybersecurity.
Explore the evolving human-AI relationship in 2024: upskilling with new AI regulation, reevaluating business plans, and addressing deepfake threats.
Explore parallels between Formula One strategies and cybersecurity challenges. Learn how continuous adaptation ensures optimal performance in both domains
Implemented in 2023, the EU-US Data Privacy Framework now faces a critical test in 2024 with activist Max Schrems’ challenge.