All articles by Claudia Glover
Stricter cybersecurity rules could be costly for MSPs – and their customers
A proposed expansion to NIS rules to cover managed service providers would reduce the risk of supply chain attacks but the costs would be significant
Can Lapsus$ be stopped? How the hacking gang hit tech’s biggest names
The notorious gang has been in the headlines for weeks. How is it infiltrating systems, and can it be stopped?
Is Microsoft the latest tech giant to be breached by Lapsus$?
The hacking gang appears to have struck another tech giant, days after it posted a “recruitment advert” for Microsoft insiders.
Greencore case highlights risk of employee data breach claims
Staff at the food manufacturing company could claim compensation over a data breach, highlight the risk such incidents pose.
Is Lapsus$ targeting Big Tech after Samsung and Nvidia data breaches?
The motivations for the attacks on two major tech businesses appear, on the surface, financial. But a bigger agenda might be at play.
Cyberattacks in Russia-Ukraine conflict are so far ‘no more than a nuisance’
Russia’s invasion of Ukraine has triggered cyberattacks on both sides but so far they have had little impact on the conflict.
Conti’s allegiance to Russia could help the ransomware gang avoid capture
Ransomware gang Conti faced an online backlash after declaring support for Russia’s invasion of Ukraine. But the statement could help the gang in the long run.
Pan-European effort to support Ukraine on cybersecurity may have come too late
Europe’s Cyber Rapid Response Team has been activated to support cybersecurity efforts in Ukraine in light of the Russian invasion. But it may have come too late to make a difference.
Massive NHS patient data breach could lead to criminal proceedings
The sensitivity of data reportedly breached when an unencrypted memory stick was sent to an employee means it may have been a criminal offence, lawyers say.
The security challenges of edge computing
Why the distribution of data processing to the network’s edge may require a new paradigm for cybersecurity.
 
           
                                     
                                     
                                     
                                     
                                     
                                     
                                     
                                     
                                    