What if your most valuable business assets were quietly being stolen in the shadows? Trade secret theft has surged in recent years, with advances in technology and the rise of cyber crime ...
Hackers are focused on penetrating critical infrastructure for potential future sabotage and steaing sensitive information.
Smartphones, tablets and laptops are essential for communication, data access & collaboration but are equally attractive targets for cyberattacks.
Canada's main spy agency says it has has found evidence of the Indian government using illicit spyware to track & intercept Sikh separatists.
Managing cyber risk is a powerful business enabler, helping businesses to become more efficient and more competitive.
As the Biden Presidency fades, the White House has issued a comprehensive new plan to harness Artificial Intelligence for national security.
The US government needs to move fast to build new computing infrastructure if it is to to keep pace with AI research and the related economic benefits.
One in five UK companies test their data recovery systems just once a year. Only 5% say they test monthly. By Stephen Young.
A campaign of attacks on local councils is thought to be part o part of Russia’s response to the UK’s growing involvement in the Ukraine war.
More than 50% of European cyber security professionals say their team is understaffed and struggling to manage growing workloads and they feel restricted and constrained. These European IT security ...
Critics claim the platform is used to promote politically motivated messages including conspiracy theories, which are essentially propaganda.
With the polls even, what is the potential for collaboration between Nation State Actors & Cybercrime Groups? By Craig Watt ...