Total cost of ransomware attack heading towards $2m

The average total cost to an organisation of recovering from a ransomware attack has more than doubled in the space of just 12 months, rising from $761,106 (£588,000 at... Read more »

Leaky Azure storage account puts software developer IP at risk

A degree of mystery surrounds the provenance of a newly discovered cache of confidential source code data that was left exposed and accessible in a misconfigured Microsoft Azure Blob... Read more »

Why we need to reset the debate on end-to-end encryption to protect children

Last week, the National Society for the Prevention of Cruelty to Children (NSPCC) released a report in a bid to raise understanding of the impact of end-to-end encryption (E2EE) on children’s... Read more »

Apple OS updates patch multiple security holes

Users of Apple mobile devices are being urged to upgrade their phones and tablets to the latest version of iOS 14.5 in order to mitigate the impact of a... Read more »

North London school wins NCSC girls’ cyber challenge

A team of four girls from Highgate School in North London have been crowned the winners of the National Cyber Security Centre’s (NCSC’s) CyberFirst Girls Competition after beating more... Read more »

The Security Interviews: Making sense of outbound email security

When you think about email security, you think of suppliers such as Mimecast or Proofpoint, whose marque pops up at the bottom of millions of business emails as a... Read more »

French legal challenge over EncroChat cryptophone hack could hit UK prosecutions

French police unlawfully intercepted text messages from tens of thousands of encrypted phones in an operation that led to thousands of arrests across Europe, lawyers claim. Investigators from France’s... Read more »

GCHQ: Cyber investment a guarantor of UK’s global status

To avoid a technological future dictated by hostile nation states, it is more vital then ever for the UK to invest in developing sovereign technologies in areas such as... Read more »

Researchers shed more light on APT29 activity during SolarWinds attack

Threat researchers at RiskIQ’s Atlas intelligence unit have gleaned potentially important new insight into the infrastructure and tactics used in the SolarWinds cyber espionage campaign from the firm’s network... Read more »

Automation, zero-trust, API-based security priorities for EMEA CISOs

Cyber security leaders across EMEA are prioritising investments in security orchestration automation, zero-trust and API-based security as they attempt to optimise their network security postures as they face up... Read more »
Subscribe to our Newsletter