Smart devices: using them safely in your home
<div>Many everyday items are now connected to the internet: we explain how to use them safely.</div>
<div>Many everyday items are now connected to the internet: we explain how to use them safely.</div>
<div>Risk appetites; what are they, what’s their purpose, how do organisations go about defining them?</div>
<div>Jon L provides an update on the NCSC's guidance on the 'WannaCry' ransomware.</div>
<div>Why I'm trying desperately to stop saying 'it depends' when it comes to simple cyber security questions...</div>
<div>The NCSC's Cloud Security Research Lead suggests some approaches to help you get confidence in cloud services.</div>
<div>Andy P explains how the NCSC rolls out software updates without delays.</div>
<div>An updated report from the NCSC explaining how UK law firms - of all sizes - can protect themselves from common cyber threats.</div>
<div>Recommended profiles to securely configure TLS for the most common versions and scenarios, with additional guidance for managing older versions.</div>
<div>How setting up 2SV can help protect your online accounts, even if your password is stolen.</div>
<div>Highlighting guidance which will help you secure your servers</div>
Microsoft exposed four individuals behind an Azure Abuse scheme using unauthorized GenAI access to create harmful content.Microsoft shared the names of four developers of malicious tools designed to bypass the guardrails of generative AI services, including Microsoft’s Azure OpenAI Service. Microsoft is taking legal action against these defendants, dismantling their operation, and curbing misuse of its AI technology.The four individuals are Arian Yadegarnia aka “Fiz” of Iran, Alan Krysiak aka “D
Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following criticism overbroad language that appeared to give the company the rights to all information uploaded by users.The revised Terms of Use now states -You give Mozilla the rights necessary to operate Firefox. This includes processing your data as we describe in the Firefox Privacy Notice. It
Security teams often struggle with disparate security tools and disjointed workflows, leading to delayed threat responses. Fortinet's presentation at Cloud Field Day showcased how its FortiSOAR platform addresses this challenge by orchestrating threat intelligence from FortiNDR (Network Detection and Response) and FortiCNAPP (Cloud Native Application Protection Platform). This integration seamlessly connects network and cloud threat data, enabling automated responses to reduce SOC workload and a
In this exclusive interview, CardinalOps CEO Michael Mumcuoglu discusses the challenges organizations face in understanding and managing their threat exposure. He explores why traditional approaches fall short citing issues like siloed teams, fragmented prioritization, and inconsistent remediation and introduces the CardinalOps Threat Exposure Management platform as a game-changing solution. Learn how a unified approach across both detection and prevention, enriched with business context and thr
CardinalOps’ platform unifies detection and prevention, integrating across the security stack. With expertise in adversary behaviors, threat intelligence, and compensating controls, it enables smarter, safer threat remediation.
Fortinet's Cloud Field Day presentation highlighted the untapped potential of network traffic for security insights. Derrick Gooch demonstrated how Fortinet's AI-powered threat detection analyzes virtual machine traffic in real-time, minimizing performance impact and transforming raw network data into actionable intelligence for swift threat detection and mitigation within cloud environments. This is crucial because attackers frequently bypass perimeter defenses, making internal network monitori
Our monthly Cyber Threat Intelligence webinar giving you further insight and exclusive access to what's going on now with recommendations and advice for your organisation. Join our Global Head of Threat Intelligence, Matt Hull, each month for: A deeper understanding of the latest report findings A look at emerging trends by region and sector Insight into new threat actors Q&A
Teams often lack the context needed to prioritize threat exposures effectively—like asset criticality, sensitivity, and threat intelligence. Without a holistic view, decisions are made in silos, leading to wasted time and resources.
This is the webinar replay of "AI in Automated Newsletters: Create actionable threat intl newsletters faster." It aired live on Feb 26, 2025, at 9 AM PST. Shawn briefly discussed Feedly Threat Intelligence and the challenge of creating newsletters. Farah showed a demonstration of the AI in Newsletters feature, including: The difference between AI Overview (applies to sections or the entire newsletter) and AI Summary (applies to articles within a section) Basic and more advanced prompts and
📺 Tune into The Spotlight Network with Emmy Award Winner, broadcaster and actor Logan Crawford (Blood Bloods, The Blacklist, Manifest, Bull, The Irishman, Marry Me, Three Women, The Big Short, Person of Interest, Gotham, The Following, Daredevil, Not Okay, The First Purge ). ⚡ A Cosmic Call to Action Dive into a science fiction adventure where destiny meets modernity. In Ancient Destiny, Albert Lynn Clark transports us to a world teetering on the edge of cosmic change. With Earth facing an impe