After wave of credential stuffing attacks.
8 use cases for generative AI in manufacturing
Generative AI can potentially help manufacturers improve daily operations and increase efficiency, among other use cases. Learn more with these...more
NHS IT the big winner in Reeves’ Spending Review
The chancellor of the exchequer has significantly upped spending on digital and technology initiatives in the current Spending Review period,...more
WhatsApp seeks to join Apple in legal challenge against Home Office encryption orders
WhatsApp today applied to intervene in an Investigatory Powers Tribunal case that is considering the UK’s ability to issue a...more
What is an asymmetric cyberattack?
An asymmetric cyberattack refers to cyberwarfare that inflicts a proportionally large amount of damage compared to the resources used by...more
Cyber security beyond compliance: Why resilience is the new boardroom imperative
Cyber security has been everything from a tick-box exercise to a compliance headache for organisations - but the pressing threats...more
Human vs digital therapy: AI falls short when IT pros need help
Stressed IT and cyber professionals are turning to AI chatbots for support, but is handing people's mental wellbeing over to...more
Investor behaviour in the wake of cyber’s ‘black swan’ moment
So-called Black Swan events expose the blind spots in even the most sophisticated forecasting models, signaling a need to rethink...more
Government using national security as ‘smokescreen’ in Apple encryption row
Senior conservative MP David Davis says the Home Office should disclose how many secret orders it has issued against telecoms...more
West Brom Building Society project to meet customers’ digital demands
Calls from customers for a choice of digital channels drove West Brom Building Society’s digital transformation project
















