Microsoft starts including PQC algorithms in cyber foundations /Commvault users told to patch two RCE exploit chains /Warlock claims more victims as cyber attacks hit Colt and Orange /Is it time to build an AI factory? /ChatGPT: Everything you need to know /Jack of all managed security services, or master of none? /Interview: David Walmsley, chief digital and technology officer, Pandora /Metropolitan Police contract with Fujitsu is ‘potential conflict of interest’ amid Post Office probe /UK chip strategy needs an AI acceleration slant /Google spins up agentic SOC to speed up incident management /Deepfake AI scammers target the Big Yin /ISACA launches AI security management certification /The future workforce is not fully human, and that is a good thing /HPE taps into AI market demand with Nvidia Blackwell-powered servers /Storage data management tools: What they do and what’s available /US says UK has agreed to drop encryption ‘back door’ demands against Apple /Workday hit in wave of social engineering attacks /Extremist hacker who defaced websites and stole data imprisoned /L’Oréal to promote cyber resilience for Britain’s beauty salons /AI advances clear path to software development careers /
Microsoft starts including PQC algorithms in cyber foundations /Commvault users told to patch two RCE exploit chains /Warlock claims more victims as cyber attacks hit Colt and Orange /Is it time to build an AI factory? /ChatGPT: Everything you need to know /Jack of all managed security services, or master of none? /Interview: David Walmsley, chief digital and technology officer, Pandora /Metropolitan Police contract with Fujitsu is ‘potential conflict of interest’ amid Post Office probe /UK chip strategy needs an AI acceleration slant /Google spins up agentic SOC to speed up incident management /Deepfake AI scammers target the Big Yin /ISACA launches AI security management certification /The future workforce is not fully human, and that is a good thing /HPE taps into AI market demand with Nvidia Blackwell-powered servers /Storage data management tools: What they do and what’s available /US says UK has agreed to drop encryption ‘back door’ demands against Apple /Workday hit in wave of social engineering attacks /Extremist hacker who defaced websites and stole data imprisoned /L’Oréal to promote cyber resilience for Britain’s beauty salons /AI advances clear path to software development careers /