Preparing for the Digital Operational Resilience Act (DORA)
The Digital Operational Resilience Act (DORA) is a regulatory framework introduced by the European Union to strengthen the digital resilience of financial institutions and mitigate
The Digital Operational Resilience Act (DORA) is a regulatory framework introduced by the European Union to strengthen the digital resilience of financial institutions and mitigate
As the 2024 holiday shopping season approaches, retailers everywhere are gearing up for a rush of online customers. This period, critical for annual sales, is
Cyber criminals all over the world have been using a new kit to easily create over 2000 phishing websites in Australia, Japan, Spain, the U.K.,
Cyber security is in a worrying state. The global workforce of cyber security professionals stands at 5.5 million people, but with ever-increasing demand for their
As the deadline for PCI DSS 4.0 compliance approaches in March 2025, businesses must prepare for new security requirements related to websites using JavaScript and
Software developers are constantly finding issues with their products. Each update for a piece of software will contain any number of patches for vulnerabilities that
Despite more than half of us being constantly connected online, belief in cyber security is starting to wane, according to the Annual Cyber Security Attitudes
Every October, Cyber Security Awareness Month shines a spotlight on the importance of staying secure in an increasingly digital world. This month-long campaign raises awareness
Russian cyber security firm Kaspersky published its annual web tracking report yesterday, and Google once again comes out at the top of the pile.
The Payment Card Industry Data Security Standard (PCI DSS) ensures that all companies accepting, processing, storing, or transmitting credit card information maintain a secure environment.
What do you get when you put tens of thousands of hackers and cyber security experts together in the Las Vegas Convention Center? Apart from
Sometimes the best way to defend is to attack. In cyber security, one of the most effective proactive security measures you can take is to
Penetration testing, commonly known as pen testing, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. It involves certified ethical
Move over Y2K, there’s a new legendary outage in town. A broken software update has crashed Windows devices around the world, bringing airports, TV channels,
Your organisation’s security extends beyond its own walls. Every organisation has suppliers. Whether they deliver products, systems, customers or services, the modern landscape of business