All articles by Claudia Glover

Claudia Glover

Stricter cybersecurity rules could be costly for MSPs – and their customers

A proposed expansion to NIS rules to cover managed service providers would reduce the risk of supply chain attacks but the costs would be significant

Can Lapsus$ be stopped? How the hacking gang hit tech’s biggest names

The notorious gang has been in the headlines for weeks. How is it infiltrating systems, and can it be stopped?

Is Microsoft the latest tech giant to be breached by Lapsus$?

The hacking gang appears to have struck another tech giant, days after it posted a “recruitment advert” for Microsoft insiders.

Greencore case highlights risk of employee data breach claims

Staff at the food manufacturing company could claim compensation over a data breach, highlight the risk such incidents pose.

Is Lapsus$ targeting Big Tech after Samsung and Nvidia data breaches?

The motivations for the attacks on two major tech businesses appear, on the surface, financial. But a bigger agenda might be at play.

Cyberattacks in Russia-Ukraine conflict are so far ‘no more than a nuisance’

Russia’s invasion of Ukraine has triggered cyberattacks on both sides but so far they have had little impact on the conflict.

Conti’s allegiance to Russia could help the ransomware gang avoid capture

Ransomware gang Conti faced an online backlash after declaring support for Russia’s invasion of Ukraine. But the statement could help the gang in the long run.

Pan-European effort to support Ukraine on cybersecurity may have come too late

Europe’s Cyber Rapid Response Team has been activated to support cybersecurity efforts in Ukraine in light of the Russian invasion. But it may have come too late to make a difference.

Massive NHS patient data breach could lead to criminal proceedings

The sensitivity of data reportedly breached when an unencrypted memory stick was sent to an employee means it may have been a criminal offence, lawyers say.

The security challenges of edge computing

Why the distribution of data processing to the network’s edge may require a new paradigm for cybersecurity.