cybersecurity

Zero Trust: Unravelling the enigma and charting the future

For nearly two decades, the concept of Zero Trust has perplexed and intrigued IT and cybersecurity professionals alike. It’s been labelled a vulnerability, a decision, a mindset, and even a paradigm shift. Its definition is as elusive as its application is broad, underpinning a diverse array of technologies. But what exactly is Zero Trust? What…

Zero Trust: Unravelling the enigma and charting the future Read More »

Better hygiene may mitigate the need to ban ransomware payments

The general belief that a cyber breach is a matter of ‘if’ not ‘when’ means all organisations potentially face the highly unwelcome prospect of being infected by ransomware, with critical data and operational capabilities only being released following payment to the attacker. Handling a ransomware attack calls for the enterprise to weigh up the value…

Better hygiene may mitigate the need to ban ransomware payments Read More »

Security Think Tank: Maybe let’s negotiate with terrorists

Okay, hear me out.  In the 1960s and 70s, the UK began to develop the policy of non-negotiation in response to the increasing number of terrorist incidents primarily from Northern Ireland; though another, more famous example of not negotiating, would be the siege of the Iranian Embassy in 1980. In the US, the position started…

Security Think Tank: Maybe let’s negotiate with terrorists Read More »

ChatGPT plugins are handy, but they could give bad actors unbridled access to your accounts

One of the best things about ChatGPT is the huge library of third-party plugins that can make the AI chatbot do far more than OpenAI originally designed it for. From plugins that make running computations easier to those that allow you to pull information from your outside accounts, a cybersecurity firm has issued a stark…

ChatGPT plugins are handy, but they could give bad actors unbridled access to your accounts Read More »

How can we adapt work practices to protect CISO mental health?

Today’s CISOs face a rapidly expanding threat landscape. And it’s not only the volume of threats adding mounting pressure to the CISO role. Their increasing sophistication is weighing heavier, with social engineering, ransomware and operational technology (OT) and the internet of things (IoT) cited as three principle attack types keeping CISOs up at night. According…

How can we adapt work practices to protect CISO mental health? Read More »

Intel Brings vPro to 14th Gen Desktop and Core Ultra Mobile Platforms for Enterprise

As part of this week’s MWC 2024 conference, Intel is announcing that it is adding support for its vPro security technologies to select 14th Generation Core series processors (Raptor Lake-R) and their latest Meteor Lake-based Core Ultra-H and U series mobile processors. As we’ve seen from more launches than we care to count of Intel’s…

Intel Brings vPro to 14th Gen Desktop and Core Ultra Mobile Platforms for Enterprise Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top