Cozy Bear targets MS 365 environments with new tactics
The Russian intelligence-linked advanced persistent threat (APT) group tracked variously as Cozy Bear, APT29 or Nobelium, among other names,…
Complex cloud architecture is finally causing budgetary pain
According to a report published by Anodot, 49% of survey respondents find it difficult to get cloud costs under control. Furthermore,…
What the FTC’s Scrutiny of Data Collection May Mean
More regulatory oversight may come in the years ahead if the US Federal Trade Commission cracks down on data collection…
How Military People and Processes Can Help Companies Win the Cyberwar
One of the biggest threats to all organizations today — from the financial sector to schools to startups — comes…
What is an API? Application programming interfaces explained
The term API stands for application programming interface, a concept that applies everywhere from command-line tools to enterprise code, microservices,…
How can we make sure the UK is a world leader?
By Published: 19 Aug 2022 Ensuring that both personal and industrial data can flow responsibly across the entire economy…
Why IT and procurement teams must work together to go green
There has been a boom of late in professional services and consultancy firms that have started building out their…
Why you should start your post-quantum encryption migration now
Firms should already be aware that quantum computing threatens to break the encryption that underpins all current digital interactions.…
GPS tagging of migrants breaches UK data protection law, says Privacy International complaint
Privacy International has filed complaints with the Information Commissioner’s Office (ICO) and the Forensic Science Regulator (FSR) over the…
Ukraine war drives DDoS attack volumes ever higher
The number of observed distributed denial-of-service (DDoS) attacks nearly trebled during the first six months of 2022, with tit-for-tat…