An input validation attack is any malicious cyberattack that involves an attacker manually entering strange, suspicious or unsafe information into...more
Senator warns of new UK surveillance risks to US citizens following Apple ‘back door’ row
US lawmarker raises concerns that UK may have ordered Google to introduce ‘backdoors’ into end-to-end encrypted back-ups impacting billions of...more
What is X (formerly Twitter)?
X (known as Twitter until 2023) is a free social networking and microblogging site where registered users can broadcast short...more
What is good automated manufacturing practice (GAMP)?
Good automated manufacturing practice (GAMP) is a set of guidelines for pharmaceutical manufacturers.
Austrian government faces likely legal challenge over state spyware
Civil society groups are talking to opposition MPs about bringing a legal challenge to the Austrian constitutional court over ‘state...more
European Commission ignores calls to reassess Israel data adequacy
The European Commission is ignoring calls to reassess Israel’s data adequacy status in spite of concerns raised about its data...more
Global cyber spend will top $200bn this year, says Gartner
Worldwide spending on cyber security will hit another record high in 2025, and will go higher still next year
Burnout burden: why CISOs are at breaking point, what needs to change
CISOs face growing burnout as their roles expand beyond security, with high stress, low organisational authority, and short tenure. AI...more
Building digital resilience in retail
Retail is suffering economically and from hacking attacks. What steps can retailers can take to prevent cyber attacks, supply chain...more
US spy satellite agency says law enforcement probing ‘incident’
Affecting intelligence contracting website.
















