compliance

CISPE criticised over securing preferential cloud pricing on Microsoft products for members

A European trade body is facing criticism for striking a deal with Microsoft that allows its members to host and resell the software giant’s cloud offerings with preferential pricing terms.   The Cloud Infrastructure Services Providers In Europe (CISPE) trade body has reached an agreement with Microsoft that will see its members offered revised pricing…

CISPE criticised over securing preferential cloud pricing on Microsoft products for members Read More »

Signalgate is a signal to revisit security onboarding and training

The recent leak of sensitive US military operations via the Signal messaging platform, triggered by the accidental inclusion of a journalist in a group chat, underscores a fundamental and often overlooked vulnerability in many organisations: people. Specifically, individuals who operate within or adjacent to an organisation but fall outside standard onboarding and training processes. This…

Signalgate is a signal to revisit security onboarding and training Read More »

How not to go off the rails with agentic AI

The hype has been strong on agentic artificial intelligence (AI) and the potential business benefits are real. However, their greater autonomy means you can go off the rails without introducing guardrails from the start to reduce risk and avoid cost blowouts. Ev Kontsevoy, chief executive at identities management platform Teleport, says the good news is…

How not to go off the rails with agentic AI Read More »

What VMware’s licensing crackdown reveals about control and risk 

Over the past few weeks, VMware customers holding onto their perpetual licenses, which are often unsupported and in limbo, have reportedly begun receiving formal cease-and-desist letters from Broadcom. The message is as blunt as it is unsettling: your support contract has expired, and you are to immediately uninstall any updates, patches, or enhancements released since…

What VMware’s licensing crackdown reveals about control and risk  Read More »

How cyber security professionals are leveraging AWS tools

With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration for IT security teams and professionals. As such, AWS offers a broad range of cyber security tools to secure AWS-based tech stacks. They cover areas such as data privacy, access management, configuration management, threat detection,…

How cyber security professionals are leveraging AWS tools Read More »

Rethinking secure comms: Are encrypted platforms still enough?

In today’s constantly changing cyber landscape, answering the question “what does best practice now look like?” is far from simple. While emerging technologies and AI-driven security tools continue to make the headlines and become the topics of discussion, the real pivot point for modern security lies not just in the technological advancements but in context,…

Rethinking secure comms: Are encrypted platforms still enough? Read More »

AI should be used to improve boardroom efficiency

According to the Corporate Governance Institute, despite the rapid roll-out of artificial intelligence (AI) to assist with the day-to-day running of companies, senior leaders are reluctant to utilise this technology to enhance their own efficiency and performance.  A study from Deloitte recently reported that 45% of boards do not include AI on their agendas. The…

AI should be used to improve boardroom efficiency Read More »

Preparing for AI: The CISO’s role in security, ethics and compliance

As generative AI (GenAI) tools become embedded in the fabric of enterprise operations, they bring transformative promise, but also considerable risk. For CISOs, the challenge lies in facilitating innovation while securing data, maintaining compliance across borders, and preparing for the unpredictable nature of large language models and AI agents. The stakes are high; a compromised…

Preparing for AI: The CISO’s role in security, ethics and compliance Read More »

Gmail ‘bubble’ encryption may be an S/MIME killer, says Google

Google is this week unveiling an enhanced client-side encryption (CSE) standard across its widely-used Gmail service – which marks its 21st birthday on 1 April – that it hopes may render the long-in-the-tooth Secure/Multipurpose Internet Mail Extensions (S/MIME) standard for end-to-end encrypted email (E2EE) obsolete once and for all. S/MIME is used for public-key encryption…

Gmail ‘bubble’ encryption may be an S/MIME killer, says Google Read More »

Secure software procurement in 2025: A call for accountability

The software security landscape is at an interesting juncture. As Jen Easterly, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), pointed out, there is a lesson to be drawn from the automotive industry of the 1960s. Its approach to improving car safety by building better designs – including seatbelts, crumple zones, and…

Secure software procurement in 2025: A call for accountability Read More »

Shopping Cart
Scroll to Top