compliance

Most Influential Women in UK Tech: The 2025 longlist

Computer Weekly’s list of the most influential women in UK technology has been running since 2012, launched to promote a discussion surrounding the role of women in the technology sector during a time when the lack of diversity in tech was only beginning to be considered. When it was launched, the list only featured 25…

Most Influential Women in UK Tech: The 2025 longlist Read More »

SLA promises, security realities: Navigating the shared responsibility gap

The shared responsibility model (SRM) plays a central role in defining how security and operational duties are split between cloud providers and their customers. However, when this model intersects with service level agreements (SLAs), it introduces layers of complexity. SLAs typically cover metrics like uptime, support response times and service performance, but often overlook critical…

SLA promises, security realities: Navigating the shared responsibility gap Read More »

US politicians ponder Wimwig cyber intel sharing law

A long-awaited update to the US’s Cybersecurity Information Sharing Act (CISA) of 2015 – which lapses at the end of September amid gathering concerns over compliance gaps and increased risk to end-user organisations – is advancing through Congress in Washington DC. The replacement legislation, now named the Widespread Information Management for the Welfare of Infrastructure…

US politicians ponder Wimwig cyber intel sharing law Read More »

Estimated 96% of EMEA financial services sector not ready for DORA

The vast majority of financial services firms across Europe believe themselves to be unable to meet the full business resiliency requirements of the EU’s Digital Operational Resilience Act (DORA) regulation. Research conducted by Censuswide on behalf of data backup supplier Veeam in June 2025 found that 96% of EMEA financial services organisations believe they need…

Estimated 96% of EMEA financial services sector not ready for DORA Read More »

CISPE criticised over securing preferential cloud pricing on Microsoft products for members

A European trade body is facing criticism for striking a deal with Microsoft that allows its members to host and resell the software giant’s cloud offerings with preferential pricing terms.   The Cloud Infrastructure Services Providers In Europe (CISPE) trade body has reached an agreement with Microsoft that will see its members offered revised pricing…

CISPE criticised over securing preferential cloud pricing on Microsoft products for members Read More »

Signalgate is a signal to revisit security onboarding and training

The recent leak of sensitive US military operations via the Signal messaging platform, triggered by the accidental inclusion of a journalist in a group chat, underscores a fundamental and often overlooked vulnerability in many organisations: people. Specifically, individuals who operate within or adjacent to an organisation but fall outside standard onboarding and training processes. This…

Signalgate is a signal to revisit security onboarding and training Read More »

How not to go off the rails with agentic AI

The hype has been strong on agentic artificial intelligence (AI) and the potential business benefits are real. However, their greater autonomy means you can go off the rails without introducing guardrails from the start to reduce risk and avoid cost blowouts. Ev Kontsevoy, chief executive at identities management platform Teleport, says the good news is…

How not to go off the rails with agentic AI Read More »

What VMware’s licensing crackdown reveals about control and risk 

Over the past few weeks, VMware customers holding onto their perpetual licenses, which are often unsupported and in limbo, have reportedly begun receiving formal cease-and-desist letters from Broadcom. The message is as blunt as it is unsettling: your support contract has expired, and you are to immediately uninstall any updates, patches, or enhancements released since…

What VMware’s licensing crackdown reveals about control and risk  Read More »

How cyber security professionals are leveraging AWS tools

With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration for IT security teams and professionals. As such, AWS offers a broad range of cyber security tools to secure AWS-based tech stacks. They cover areas such as data privacy, access management, configuration management, threat detection,…

How cyber security professionals are leveraging AWS tools Read More »

Rethinking secure comms: Are encrypted platforms still enough?

In today’s constantly changing cyber landscape, answering the question “what does best practice now look like?” is far from simple. While emerging technologies and AI-driven security tools continue to make the headlines and become the topics of discussion, the real pivot point for modern security lies not just in the technological advancements but in context,…

Rethinking secure comms: Are encrypted platforms still enough? Read More »

Shopping Cart
Scroll to Top