What data protection considerations are there when procuring, developing and deploying AI systems?
By Liz Smith, associate in the commercial team at independent UK law firm Burges Salmon In the rapidly evolving landscape
By Liz Smith, associate in the commercial team at independent UK law firm Burges Salmon In the rapidly evolving landscape
While traditional security tools generate a barrage of alerts, deciphering what’s truly a threat and what’s just noise can be
IN4 Group has secured the contract to deliver CyberFirst on behalf of the National Cyber Security Centre (NCSC), a part
Both private and public sector CISOs in the UK face a constant barrage of security alerts. But traditional security information
Will you be joining us at the upcoming Cyber Secure Forum? You’ll enjoy a day of seminars and networking with
If you’re a cybersecurity professional and would like to share your knowledge, case studies and best practice with peers, then
75% of U.S. federal agencies will fail to implement zero trust security policies by 2026 due to funding and expertise
Phishing attacks remain a major cyber threat for organisations in the UK’s public and private sectors. These often sophisticated scams
BlackBerry’s Global Threat Intelligence Report states that threat actors focusing efforts on targeting high-value data held by the global financial
More than 30% of the increase in demand for application programming interfaces (APIs) will come from AI and tools using
CISOs (Chief Information Security Officers) across public and private sectors face a monumental challenge: safeguarding sensitive data and critical infrastructure.
As a senior professional in the cyber security industry, we’d like to send you an exclusive invitation to a niche
Each month on Cyber Security Briefing we’re shining the spotlight on a different part of the cyber security market –
Elon Musk’s claim that AI will make all human jobs irrelevant should not be taken seriously, according to a survey
Chief Information Security Officers (CISOs) shoulder heavy responsibility for safeguarding sensitive data and critical infrastructure. Intrusion Detection Systems (IDS) and