ETSI announces the publication of its new standard, ETSI EN 304 223, that provides baseline cybersecurity requirements for AI models and systems. Building on the foundational work set out in its recent Technical Specification, it is a first globally applicable…
Cloud Strategy for 2026: the year of repatriation, resilience, and regional rebalancing
This year is set to be a pivotal year for Cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing focus on data sovereignty, writes Rob Coupland, Chief Executive…
From trolley to template: The rise of facial recognition technology in British supermarkets
For shoppers frequenting the Sainsbury’s supermarket in Sydenham, south London, over the festive period, there was the usual seasonal battle to pile trolleys high with Christmas treats and manoeuvre them through crowds of families doing the same thing. What few…
Six top cybersecurity predictions for 2026
2026 will be a year where AI-driven threats, regulatory pressures, and the decline of legacy tools will reshape the security landscape, predicts Corey Nachreiner, chief security officer at WatchGuard Technologies. He argues that organisations must prepare for rapid evolution in…
Data retention is the new cyber risk: why smart storage strategies matter for IoT
As IoT environments scale, uncontrolled data retention expands risk, cost, and complexity. In this article, Seth Goldhammer, VP of Product Management at Graylog explores how smarter storage strategies help organisations reduce attack surfaces, boost visibility, and strengthen resilience. The conversation…
Building a trusted ecosystem: standards and regulations in support of IoT security
In the five years since ETSI published EN 303 645, the first globally recognised baseline standard for IoT security, a great deal has changed, writes Alex Leadbeater, Technical Security Director, GSMA. At its time of release, the industry was awash…
Smart gifts, hidden risks: how AI gadgets can put family privacy at risk
As smart, AI-enabled gadgets become some of the most popular gifts this holiday season, families are unknowingly expanding their digital attack surface, writes Anne Cutler, Cybersecurity Expert at Keeper Security. From connected toys and wearables to voice assistants and home…
iDenfy launches Shopify app to automate identity checks on high-risk e-commerce orders
iDenfy, a global identity verification and fraud prevention company, has launched a new Shopify app that automatically triggers identity checks on orders flagged as suspicious, as merchants grapple with rising levels of e-commerce fraud. The app integrates directly with Shopify’s…
One in three cybersecurity teams under-resourced as threats intensify
Around one in three cybersecurity teams report being under-resourced to adequately defend their organisations, highlighting ongoing pressures amid a rising threat landscape, according to the ISC2 2025 Cybersecurity Workforce Study. The survey, which included over 16,000 security professionals worldwide, found…
Exabeam and Recorded Future deepen partnership to accelerate threat detection
Exabeam, a cybersecurity firm specialising in intelligence and automation, and Recorded Future, a threat intelligence company owned by Mastercard, have broadened their technology partnership to provide more proactive security operations for enterprise clients. The integration links Exabeam’s New-Scale Security Operations…