From steel to silicon part 1: Your vehicle is a data centre on wheels – how it happened
As cars transform into computers on wheels, they offer cutting-edge functionality but also open up to new cyber attacks.
Read moreAs cars transform into computers on wheels, they offer cutting-edge functionality but also open up to new cyber attacks.
Read moreWant to download this article? Click here This exclusive guide from Google Cloud provides a…
Read moreExecutive Summary In a stark reminder of the evolving threat landscape, multinational telecommunications provider Colt…
Read moreIntroduction With a keen eye on cybersecurity news that impacts our customers, and a background…
Read moreWhile many in the cybersecurity industry are talking about integrating AI into their defensive cyber systems there is far less discussion about how offensive cyber agents are going to change our landscape.
Read moreOver two decades in cybersecurity, I’ve seen countless trends, threats and hype curves come and go. But one constant remains: We rely so much on our vendors — and it’s profoundly damaging when they introduce the very weaknesses that they’re supposed to protect us from.
Read moreIn an era where cyber threats are evolving at an unprecedented pace, traditional security models…
Read moreMeta’s recently launched “Not even WhatsApp” global advertising campaign is more than just a marketing campaign – it’s bringing the topic of information confidentiality to the public in a way that is highly relatable.
Read moreIntroduction A recent investigation by our DFIR team into unauthorised data exposure brought to light…
Read moreThis week, three of the most influential reports in cybersecurity were released; Google Cloud’s M-Trends,…
Read more