
The 5 Key Cybersecurity Risks and Challenges Facing Supply Chains
Supply chains are vulnerable to cyber attacks due to their complexity and reliance on partnerships. Security leaders must recognize that the security issues of supply

Labour vows to enhance digital infrastructure in 2024 general election
The Labour Party manifesto for the 2024 general election pledges to support the tech and digital sectors by implementing a new industrial strategy and reforming

Is data leakage preventable in the cloud?
As organizations increasingly store and process data in the cloud, there is growing concern among administrators, data owners, and CISOs about potential misconfigurations or mishaps

The Black Basta ransomware group could be leveraging a Microsoft zero-day vulnerability
Users have been warned that a vulnerability in the Microsoft Windows Error Reporting Service, known as CVE-2024-26169, was exploited as a zero-day by the Black

Decline in diversity and inclusion in tech industry highlighted in TTC report
The Tech Talent Charter (TTC) has highlighted concerning trends in the tech industry regarding diversity, equity, and inclusion (DE&I). Despite progress in the past five

Interview with the CIO: Advancing in your career and aligning with business goals
Ash Cooper, who started his career in IT over 20 years ago in PC support, unexpectedly found himself as the CIO of FTSE 100 law

CMA’s Working Paper Raises Concerns Over Microsoft’s Dominance in the UK Cloud Market
Experts have warned that the Competition and Markets Authority’s (CMA’s) current investigation into Microsoft’s cloud software licensing strategy should be concerning for the company. Despite

Understanding Erasure Coding: A Comparison to RAID
Erasure coding (EC), a method of data protection, involves breaking data into fragments, expanding and encoding them with redundant pieces, and storing them across multiple

Understanding Privacy Impact Assessments (PIAs)
What is a privacy impact assessment? A privacy impact assessment (PIA) is a method used to identify and evaluate privacy risks throughout the development lifecycle

Reviving the zombie subscriber population: Nordic innovators take charge
The rise of zombie subscribers, active accounts that people unknowingly pay for, has been fueled by consumers’ eagerness to consume content across various platforms. Nordic

Ensuring the Safe and Secure Use of Public Cloud Services
The public cloud, a model of cloud computing that allows remote access to resources like applications and data storage, comes with its own set of

RCE Vulnerability and DNS Zero-Day Lead Patch Tuesday Bug List
In Microsoft’s June Patch Tuesday update, a critical remote code execution (RCE) vulnerability in Microsoft Message Queuing (MSMQ) was identified as the most serious issue.