The government has proposed ways to attract new professionals to security, increase diversity and ensure leadership
Awareness of ransomware and rise in price of cryptocurrencies has caused the change, says Skybox Security
Cryptojackers steal CPU time and bandwidth, but then again so do ads, says RiskIQ
Cyber crime isn't all about speed: infiltrators are slowing down to avoid detection
Grouply.io Chrome extension allowed sensitive data to be accessed by marketers
The hacker leveraged a weakness in Netgear routers that has been general knowledge for more than two years
Hacking group Magecart responsible for a sophisticated attack via third-party vendors that could have affected 800 ecommerce sites
Celebrating Independence Day with a data breach
With Facebook fined a paltry sum, and the ICO traditionally reluctant to use its powers to the full, is there a danger that organisations will take data security less seriously?
Facebook will make the fine back in less than 20 minutes
Airline denies customers are at risk, refuses to report breach
AI GDPR compliance tool could be used to web crawl for non-compliant privacy policies
Fight over draft EU copyright directive will resume in September
What drives security changes: people or technology?
Aftermath of Facebook-Cambridge Analytica affair and GDPR starting to bite online advertisers?
Charlotte Allery, solicitor - employment at Coffin Mew, explains the pros and cons, and the legal position, of using wearable technology in the workplace
NHS Digital blamed a coding bug for the breach
Commercial data sharing partnerships continued after rules were tightened in 2015
'Signs of breach' at Ticketmaster detected by start-up bank's anti-fraud team in early April
Government departments have autonomy in how they comply with the new rules
But Oregon police say they will continue using Rekognition in criminal investigations
Cloud Access Security Broker technology is a fast growing market, and aims to help organisations apply security policies across the cloud. It's an answer to a long-standing problem, but which option is the best fit for your environment, and how do you avoid the common pitfalls?
US intelligence agents privately putting the squeeze on Huawei and ZTE, claims Senator Marco Rubio
Rare fault meant identifying and rectifying cause of problem took longer than usual
North Europe Azure outage blamed on datacentre "temperature issue" - but customers are still complaining this morning
Trump vows to oppose amendment to National Defense Authorization Act that would block ZTE deal
Incisive Works meets Catherine Howard, VP of Marketing at Atos.
More aggressive strategy pushed by new White House security advisor John Bolton
Proposed EU copyright laws would undermine EU dot-coms, campaigners warn
'I can't decrypt my own messages. There's an irony to that I guess'
Alexander Polyakov: 'We have nothing to do with Russian Federal Security Service'
Long-standing 'always listening' flaw in Cortana among 49 patched vulnerabilities
Ever shopped in Carphone Warehouse, Currys, Dixons, or PC World? Your personal and payment details could be at risk
Security flaw enables malware to be run that's been fraudulently signed by Apple
ZTE deal a 'personal favour' from President Trump - but it will definitely be shut down if it contravenes new agreement
Both Facebook and Cambridge Analytica were certified under the pact, Civil Liberties Committee points out
ERPScan denies links with security firm named in US sanctions
'If the NSA tells you to get ready for quantum computers then you'd better get ready'
Disk-wiping malware used to cover-up theft of $10m from South American bank
IoT manufacturers who prioritise cybersecurity procedures in the design stage will have a powerful competitive advantage
Popular Netgear and TP-Link routers added to Cisco Talos VPNFilter warning list
Hutchins calls 'bullshit' on new charges that 'reset the clock' in legal case