Understanding Public Key Certificates: An Overview
A public key certificate is a digital document that confirms the identity of the sender. It ties a public key to a specific entity, like
Latest Effort to Revamp UK’s Obsolete Hacking Legislation Hits a Roadblock
Two amendments aimed at protecting security professionals and ethical hackers under the 1990 Computer Misuse Act (CMA) have been withdrawn after failing to advance in
CCS Cloud Hosting Agreement with AWS Under Review as Contract Value Rises 89% After 15 Months
The Crown Commercial Service (CCS) recently increased its cloud hosting budget with Amazon Web Services (AWS) by a staggering 89%. This decision has raised eyebrows
LockBit Ransomware Group Hints at Comeback in February 2025
In February 2024, the National Crime Agency (NCA) orchestrated Operation Cronos, dealing a significant blow to the LockBit ransomware group. Yet, just days ago, an
Confronting the Cloud Giants: Are We Entering a New Era of Competition?
In October 2023, the UK’s Competition and Markets Authority (CMA) shocked the tech world by launching an investigation into possible anti-competitive practices in the UK
The Data Bill: Time to Enhance Cybersecurity
In the recent discussions on the Data Use and Access Bill in the House of Lords, I proposed two amendments aimed at updating the Computer
Transformative Strategies: The CISO Guide to Innovation, Insight, and Influence for 2025 and Beyond
As 2024 wraps up, we’re halfway through what many consider a turbulent decade. But let’s shine a light on the potential ahead for the latter
French Court Denies Request to Speed Up Trial for Sky ECC Cryptophone Distributor Thomas Herdman
Five judges are set to hear a case in spring 2026 in Paris against 30 individuals accused of distributing encrypted mobile phones used by organized
Top 10 AI and Storage Innovations of 2024
Artificial intelligence (AI) is making waves in the tech world, and it’s bringing a wave of challenges for data storage. As AI becomes more prevalent,
Axon Remains in Control of Police Scotland’s Encryption Keys
Body-worn video provider Axon still controls the encryption keys for a critical Police Scotland cloud project, despite ongoing warnings about data protection risks. In January
The 10 Most Noteworthy Cyber Crime Stories of 2024
In 2024, ransomware attacks surged, leaving devastation in their path. The UK’s NHS was a primary target, facing serious assaults this year, alongside other notable
Former HR Chief Claims Post Office IT Department Fired and Rehired ‘Friends’ at ‘Exorbitant’ Salaries
The Post Office made headlines with a troubling trend: they let go of permanent IT staff only to bring them back at shocking pay rates.