Management of the Queen Elizabeth Hospital (QEH) says a team that includes cyber security experts are developing a plan to restore the healthcare...

Sign up to receive our weekly newsletter and stay up-to-date on industry news, events, our latest articles, and staffing/recruiting opportunities!
Cybersecurity market for connected cars to grow to $4.14B by 2026
Cybersecurity services for connected cars is expected to grow to over $4 billion by 2026. (Photo by Alex Wong/Getty Images) ResearchAndMarkets.com...
Top Cybersecurity Predictions 2023
Society has been predicting the technology of the future since Jules Verne. Remember the Jetsons? Based on the predictions in that show, we should...
Why diversity matters when recruiting cybersecurity staff
Male dominated: only 12% of IT staff working in UK cybersecurity are female Putting diversity at the heart of your cybersecurity team helps you spot...
AI photography is going viral — and raising concerns about safety, privacy and ethics
/ Jumping on the AI self-portrait trend? Here’s what cyber security experts are warning. 01:50Digital portraits made with artificial...
AI/ML is the Knight to Save the Day against Cybersecurity Threats
Organizations today are looking at security tools, methods and expertise that can help catch Zero-day threats. The security tools should spot...
Cybersecurity and financial services: tackling identity challenges for better online protection
As an industry, financial services are significantly vulnerable to cyber-attacks. The Bank of England recently surveyed executives in the UK...
Cyber Security Headlines: AI generated malware, Rackspace confirms ransomware, Meta Oversight Board rules on cross-check
Are we in the age of AI generated malware? We covered yesterday that Stack Overflow temporarily banned the submission of code created with...
Data protection and security in 2023
Change is the only constant. How we think about data protection, rules and regulations, and the changing of organizational structure is evolving....
Cybersecurity Threats
Cybersecurity professionals continually defend computer systems against different types of cybersecurity threats. Even with firewalls, antivirus...
Data Bill: Endless riddle of right to privacy entangled with consent
DH Illustration Since the introduction of the new data protection draft , its features and characteristics have been under debate, and the primary...
Never lose your ID, especially in cyberspace
Identity theft is a serious cybersecurity risk you must watch out for. When someone steals another person’s personal information and uses it...
How Women can Succeed in Cybersecurity
The number of women in cyber security has been grievously low for years. However, progress can be seen. According to a study woman presently...
Cyber Security Awareness
October was Cybersecurity Awareness Month , but every day we should be aware of the potential threats that exist while using technology. The...
Cloud Security: 5 Predictions on What Lies Ahead for 2023
During the pandemic, companies embraced a radical shift of moving to public and private cloud environments. In fact, most enterprise application...
More than 17 million control system cyber incidents are hidden in plain sight
Control system cyber incidents are more common and dangerous than most security specialists and industry leaders tend to believe. They are also...
FBI Cyber Most Wanted: Iranian Threat Actors
Who are the world’s most notorious hackers? Maybe they’re the ones with a $10 million reward for their capture.The Federal Bureau of...
Cyber Risk Quantification – The What, The Why and The How!
CRQ (Cyber Risk Quantification) is the latest acronym doing the rounds in the cyber security industry. Many security professionals regularly use...
Adversaries are ready to strike US infrastructure, warn cybersecurity experts at Northeastern event
Enemies are situating themselves within the cyber operations of U.S. infrastructure sites with the potential of striking at any time, warned Brandon...
How U.S. is battling global cyber challenges, by Advisor Neuberger
Anne Neuberger is the Deputy National Security Advisor for Cyber and Emerging Technologies in the United States. Ms. Neuberger, at a briefing...
Lessons from FTX. Latest ESF guidance on supply chain security says SBOMs are key. Offensive cyber operations from DoD and DOJ.
At a glance. Lessons from FTX. Latest ESF guidance on supply chain security says SBOMs are key. Offensive cyber operations from DoD and DOJ. Lessons...