Here comes the government’s Data Bill – again
First we had the Data Protection and Digital Information Bill, introduced by the last government and lost when the…
Emerging Ymir ransomware heralds more coordinated threats in 2025
Change appears to be afoot in the threat landscape, according to NCC Group’s latest monthly Threat pulse report for…
Tech workers say diversity and inclusion efforts are working
Tech workers claim that where organisations are working to improve diversity, equity and inclusion (DEI) those efforts are making…
CISOs: Don’t rely solely on technical defences in 2025
Threats have been more sophisticated, unpredictable and harder to pin down. Attackers don’t just exploit technical weaknesses – they…
Computer Misuse Act reform gains traction in Parliament
Cross-party parliamentarians will next week debate proposals that aim to fix a “glaring flaw” in the Computer Misuse Act…
Decking the halls with AI: the evolution of managed services
As we celebrate the festive season and look ahead to 2025, it’s clear that artificial intelligence (AI) and automation…
Decoding the end of the decade: What CISOs should watch out for
It’s that time of year where we, in the industry, attempt to be cyber soothsayers. A tall order –…
How to chunk data using LINQ in C#
Using Chunk to split an array of integers in C# Let us understand this with a code example. Consider the…
Azure hardware innovations and the serverless cloud future
Russinovich demonstrated updating the network stack on Azure Boost, which can be done in under 250ms, with minimal network freeze…
The Python AI library hack that didn’t hack Python
Guess what’s both one of the fastest-growing and most popular languages of 2024? (Hint: It’s not Java.) Also in Python…