Smart devices: using them safely in your home
<div>Many everyday items are now connected to the internet: we explain how to use them safely.</div>
<div>Many everyday items are now connected to the internet: we explain how to use them safely.</div>
<div>Risk appetites; what are they, what’s their purpose, how do organisations go about defining them?</div>
<div>Jon L provides an update on the NCSC's guidance on the 'WannaCry' ransomware.</div>
<div>Why I'm trying desperately to stop saying 'it depends' when it comes to simple cyber security questions...</div>
<div>The NCSC's Cloud Security Research Lead suggests some approaches to help you get confidence in cloud services.</div>
<div>Andy P explains how the NCSC rolls out software updates without delays.</div>
<div>An updated report from the NCSC explaining how UK law firms - of all sizes - can protect themselves from common cyber threats.</div>
<div>Recommended profiles to securely configure TLS for the most common versions and scenarios, with additional guidance for managing older versions.</div>
<div>How setting up 2SV can help protect your online accounts, even if your password is stolen.</div>
<div>Highlighting guidance which will help you secure your servers</div>
Privacy matters. These apps and services help you communicate without putting your identity or data at risk from prying eyes.
Criminals were able to access 270,000 data records from Samsung Germany's support database. These are now for sale on the darknet.
Data leak at Samsung Germany: around 270,000 customer service tickets were apparently posted on the Internet by a hacker ...
An international coalition of law enforcement agencies seized the official website of Garantex, which has previously been sanctioned by the U.S. and E.U. governments.
Cyberspace is less secure than ever before. Hackers exploit human error or technical loopholes to steal data -- or publish it on the darknet, if the ransom demanded is not paid.
The average corporate user now has 146 stolen records linked to their identity, an average 12x increase from previous ...
Privacy tokens have been suffocated as governments around the world fight darknet markets – so it's back to bitcoin for purchasers of illicit goods.
Russian-language darknet marketplaces have strengthened their dominance and account for over 97% of cryptocurrency-enabled ...
Nick Goodman, Partner Product Manager Security Copilot at Microsoft, shares Copilot’s evolution from a chat-based assistant to an integrated AI tool embedded in security workflows. Initially designed to assist analysts through queries, Security Copilot quickly adapted to automation and workflow integration within products like Defender and Intune. Key use cases include phishing investigations, SOC situational awareness, process verification, and e-discovery. Microsoft has introduced multi-tenanc
Uploaded video