Your cyber intelligence source

Library

The process of signing and signatures has always been susceptible to fraud but as technology has progressed, the act of signing has become far more secure than in the past, to the point where wet signatures can be considered more risky compared to digital signatures, especially in the context of remote business.

In this long-read article, in association with Entrust, we look at why digital signatures are so paramount for security, and the connection it has with PKI.

There’s one defence against the criminals that needs a firmer push. Nina Paine, global head, cyber stakeholder and government engagement at Standard Chartered, explains how she’s behind a drive for creating a diversity of perspectives in cybersecurity – and why you should be too…

We’re all used to gloom and doom, political upheaval, pandemic woes, economic cliff-edges and all sorts of macro risks that, sometimes, we forget to look at the stuff that’s going right. To brighten this January, here’s one such example: hackers are failing to keep up with the pace of new vulnerabilities found in software and hardware.

You need to be a big organisation to protect against every threat in-house these days. And even if you’re a big firm, you need the right people in place and access to the right advice – as well as flexible, agile cyber security infrastructure. In this Sophos’ MDR Buyers’ Guide, it'll navigates you through the choppy waters of first deciding to out-source security operations, part or whole – then actually doing it.

The NHS is slowly replacing old, vulnerable technology, a new report reveals. And it’s an issue we all face. How do you keep complex systems up-to-date? How do you balance the importance of patching with the risk of disruption? And when does fit-for-purpose become dangerously outdated?