Articles
The UK government has revived its push against Apple over customer data, demanding access to British users' encrypted iCloud backups
-
Over 3,000 Android devices across Europe have already been compromised by the new sophisticated Klopatra banking and remote access trojan.
-
Teams don’t want to be buried in regulatory work; what they really want, above all else, is to be strategic rather than reactive and become an important part of the overall business’s success.
-
UK convicts Chinese scammer after major crypto seizure
The UK has convicted Chinese national Zhimin Qian, who admitted guilt over running a major investment fraud scheme.
-
The China Threat to UK Firms
The UK National Cyber Security Centre is warning that China is targeting governments and critical national infrastructure in the UK. How big is the threat to the UK, and how should organisations respond?
-
Four interlocking ways to keep cybersecurity front of mind and deepen every employee’s involvement in this task.
-
Study determines human-AI collaboration can improve productivity, trust, and wellbeing in high-pressure environments.
-
AI-powered malware can now adapt in real time, exploiting blind spots before human teams even know they exist.
-
Enterprises Are Training AI With Real Data – The Why, The Risks, The Alternatives
AI is only as smart as the data on which it is trained, but feeding AI models with real data brings massive security and privacy concerns.
-
Enterprises Opt for Secure On-Prem Data as They Count the Cost of Cloud
How organisations can manage escalating cloud costs and minimise risk, while also building a security data platform.
-
A Call to Action: It’s Time to Stop Admiring the Problem, Let’s Fix It
Attackers don’t prey on big organisations, they prey on vulnerable ones, regardless of size, focus or perceived importance.
-
Why Cyber-Criminals Target Insurers, and How They Can Fight Back
-
Practical guidance to help organisations approach network convergence and consolidate security and cloud functionalities.
-
Global Agencies Name Chinese Businesses Linked with 'Cyber Activities'
Activities described in the advisory partially overlap with campaigns commonly under the name Salt Typhoon.
-
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence