The Court has said disclosing bare details of the case does not pose a threat to UK national security.
Hameed Shuja1 min read
Despite advancements in leveraging cloud-based analysis for swift threat identification and response, the industry has largely stagnated in one critical area: true anomaly detection.
Marc Brown | Zayda Technologies3 min read
Threat actors obtained customer data by breaching the cloud environment of a former vendor.
Martina Lindberg2 min read
The US government wants to know through disclosures how technology is being protected from misuse by foreign adversaries.
Julie DiMauro1 min read
Gaurav Bhalla, a technology and data protection lawyer at Ahlawat & Associates, discusses data sovereignty and compliance.
Jean Hurley4 min read
Cyber Safety Review Board’s scathing report on intrusion of Microsoft systems by threat actor linked with China.
Thomas Hyrkiel, Julie DiMauro4 min read
US Homeland Security chief’s call for companies to bake stronger cybersecurity into products leads our infosec wrap.
Julie DiMauro2 min read
Dr Katarzyna Parchimowicz told GRIP about why the Digital Operational Resilience Act – DORA – is becoming applicable in 2025 and what it means for firms that could be designated as critical third party providers.
Carmen Cracknell37 min listen