CyberGhost VPN review 2025: A no-nonsense option for streaming

This affordable VPN excels when it comes to streaming Netflix abroad. Source: The Independent Key Points CyberGhost VPN has over 9,700 servers in 100 countries, ensuring high speeds and various location options. Designed specifically for streaming, it has servers optimised for various platforms such as Netflix, BBC iPlayer, and more. Offers a straightforward interface, especially […]

Read More →

Health sector calls for CISA role in developing insurance incentives to boost cyber best practices

A recent report from the Health Sector Coordinating Council is urging the Cybersecurity and Infrastructure Security Agency (CISA) to collaborate with state-level insurance regulators. The aim? To promote the implementation of incentives by cyber insurance providers for organisations that adopt security best practices. The healthcare industry is facing an alarming increase in cyber threats, especially […]

Read More →

NCSC warns UK critical systems face rising threats from AI-driven vulnerabilities

The UK’s National Cyber Security Centre (NCSC) has issued a stark warning about the increasing threats facing critical systems due to vulnerabilities linked to artificial intelligence (AI). This alarming trend, unveiled during the CYBERUK conference, underscores a rising ‘digital divide’ between organisations that can tackle AI-enabled threats and those that cannot. Key Points NCSC highlights […]

Read More →

Why fighting the DEI backlash is about PR as well as HR

Organisations are grappling with the growing DEI backlash, prompting a necessity for robust communication strategies to address public perception while reinforcing internal values. Dame Maria Miller and Advita Patel discuss the essential role of HR and PR in navigating this complex landscape. Source: Personnel Today Key Points DEI is a concern for the entire organisation, […]

Read More →

How Red Teams Use Real CVE Exploits to Create Realistic Attack Simulations

Red teams leverage real CVE exploits to simulate actual threats organizations may face, enabling more authentic attack scenarios. This resource explores the methods, advantages, and considerations involved in using current vulnerabilities during red team engagements. Key Points Red teams use public CVE exploits to create realistic attack simulations that reflect actual threats. This approach enhances […]

Read More →

H.I.G. Capital creates $4bn IT services group with Converge and Mainline merger

Summary H.I.G. Capital has merged Converge Technology Solutions and Mainline Information Systems to form a new entity named Pellera Technologies, valued at $4 billion. This merger aims to bolster capabilities in cybersecurity, cloud infrastructure, and AI, as the combined company looks to elevate customer experiences and compete strongly in the fragmented North American IT services […]

Read More →

ColorTokens, Nozomi deliver unified zero trust security, combining microsegmentation with AI-driven OT threat detection

ColorTokens and Nozomi Networks have teamed up to provide organisations with a powerful zero trust security solution that integrates microsegmentation with AI-driven operational technology (OT) threat detection. This new collaboration offers enhanced visibility and protection across various operational environments, making it easier for companies in sectors such as healthcare and manufacturing to secure their infrastructures […]

Read More →

Reducing employee turnover with AI-powered sentiment tracking

Summary In a bid to address employee turnover, Zenith Automotive has implemented an AI-driven sentiment tracking system via Cognexo’s platform. This approach helps them gauge the happiness and engagement levels of their over 1,200 staff daily, especially during pivotal points in their first year. Through this initiative, they have successfully reduced attrition, gained insights into […]

Read More →