Open source: a security risk?
Open source code forms the foundations of a vast amount of enterprise software, web applications and even the code that powers consumer devices, from media players to cars. But security, and open source, do not […]
Open source code forms the foundations of a vast amount of enterprise software, web applications and even the code that powers consumer devices, from media players to cars. But security, and open source, do not […]
Globally, there are more than 3.5 million unfilled jobs in cybersecurity. And the situation is becoming worse, not better. One reason is a growth in cyber threats. Certainly, there are few signs of attacks dropping […]
Most of us now accept that cyber attacks are inevitable. CISOs, certainly, expect there to be attacks, and breaches. None the less, organisations are not doing enough to ensure that they can withstand cyber attacks. […]
Healthcare is coming under an increasing volume of cyber attacks, especially since the pandemic. And attacks are spreading to smaller healthcare outfits, such as ambulance services, suppliers to the healthcare system, and the pharmaceutical industry. […]
The last few years have seen growing concerns about cyber war, driven by events in Ukraine, the Middle East and other conflict zones, and a rise incidents linked back to nation state actors. But a […]
According to analysts, more than half of key IT spending is now in the cloud. There is no doubt that it is now a mainstream technology; gone are the days when cloud was just for […]
How do we operate in a world where there is no such thing as absolute truth? And where whether a statement, event or even someone’s identity is a likelihood, probability, or a percentage score? That […]
Surveillance technology is both powerful, and controversial. Improvements in computing power and AI, as well as more powerful sensors, have opened up entirely new fields, such as remote surveillance and facial recognition. However, this is […]
When John Stenton started as head of IT at housing provider Thrive Homes, he admits its technology was a “bit of a mess”. There was a lot to do, both to review security and to […]
There’s an increasing focus on resilience in cyber. No defence is impenetrable, so organisations are looking not just at how they detect and prevent attacks, but how they maintain operations and recover. But a key, […]
Copyright © 2025 | MH Magazine WordPress Theme by MH Themes