What is microsegmentation and will it work on my IOT fleet?

With organisations under increasing pressure to secure growing numbers of connected devices, cybersecurity firms are deploying an increasingly sophisticated arsenal to protect them. One such measure, microsegmentation – isolating devices and limiting communication to reduce the impact of breaches –…

Telent lands strategic contract to support the RAF’s increasing demand for digital capability

Telent has been entrusted with one of the RAF’s most strategically important technical responsibilities, transforming how IT and communication infrastructure changes are approved and delivered across 244 sites, including all military air traffic control infrastructure.  The contract, awarded to the…

E2e-assure grows customer base as sovereignty becomes a business driver

e2e-assure reveals that demand for sovereign cyber security solutions has driven 18 new customers and several million in increased revenue. In order to continue to meet the specific needs of highly regulated UK organisations, e2e-assure has brought Richard Groome on…

ETSI releases standard for securing AI 

ETSI announces the publication of its new standard, ETSI EN 304 223, that provides baseline cybersecurity requirements for AI models and systems. Building on the foundational work set out in its recent Technical Specification, it is a first globally applicable…

Cloud Strategy for 2026: the year of repatriation, resilience, and regional rebalancing

This year is set to be a pivotal year for Cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing focus on data sovereignty, writes Rob Coupland, Chief Executive…

From trolley to template: The rise of facial recognition technology in British supermarkets

For shoppers frequenting the Sainsbury’s supermarket in Sydenham, south London, over the festive period, there was the usual seasonal battle to pile trolleys high with Christmas treats and manoeuvre them through crowds of families doing the same thing. What few…

Six top cybersecurity predictions for 2026

2026 will be a year where AI-driven threats, regulatory pressures, and the decline of legacy tools will reshape the security landscape, predicts Corey Nachreiner, chief security officer at WatchGuard Technologies. He argues that organisations must prepare for rapid evolution in…

Data retention is the new cyber risk: why smart storage strategies matter for IoT

As IoT environments scale, uncontrolled data retention expands risk, cost, and complexity. In this article, Seth Goldhammer, VP of Product Management at Graylog explores how smarter storage strategies help organisations reduce attack surfaces, boost visibility, and strengthen resilience. The conversation…

Building a trusted ecosystem: standards and regulations in support of IoT security

In the five years since ETSI published EN 303 645, the first globally recognised baseline standard for IoT security, a great deal has changed, writes Alex Leadbeater, Technical Security Director, GSMA. At its time of release, the industry was awash…

Smart gifts, hidden risks: how AI gadgets can put family privacy at risk

As smart, AI-enabled gadgets become some of the most popular gifts this holiday season, families are unknowingly expanding their digital attack surface, writes Anne Cutler, Cybersecurity Expert at Keeper Security. From connected toys and wearables to voice assistants and home…