Report: Identity Has Become a Critical Security Perimeter for Cloud Services

A new report from Fortinet highlights significant vulnerabilities in cloud services, with identity management emerging as a critical area of concern. The 2025 Global Threat Landscape Report reveals that misconfigurations are no longer the sole focus for attackers, who are exploiting over-permissioned identities and using familiar tactics to infiltrate cloud environments. The report emphasises that […]

Read More →

NASCIO Suggests Training Nonviolent Inmates for Cyber Jobs

The National Association of State Chief Information Officers (NASCIO) has proposed that vocational cybersecurity training for nonviolent offenders could help address the significant cybersecurity talent shortage in the US. The idea is to equip incarcerated individuals with the skills needed to secure employment after their release, thus benefiting both the individuals and the cybersecurity industry. […]

Read More →

US school districts facing extortion attempt after hack, software provider says

Hackers have taken aim at multiple school districts across the United States, attempting to extort them with stolen data from the education software provider PowerSchool. The company, which supports over 60 million students globally, revealed that they previously suffered a data breach, leading to concerns for student privacy. Source: Daily Mail Key Points Multiple US […]

Read More →

Over 19 billion passwords have been leaked in security ‘crisis’ – here’s how to check if yours is vulnerable

The latest report reveals a staggering leak of over 19 billion passwords, prompting urgent discussions about cybersecurity. Experts emphasise the dire need for better security practices and explain how to check if your credentials are at risk. Source: The Independent Key Points 19 billion passwords were leaked in a recent cybersecurity crisis, raising alarms about […]

Read More →

Essential Steps to Building a Strong CVE and Vulnerability Management Strategy

This resource outlines the critical steps necessary to establish a resilient CVE and vulnerability management strategy. It summarises foundational practices, highlights prioritisation methods, and emphasises the importance of continuous monitoring for maintaining robust defensive postures. Building an effective CVE and vulnerability management strategy is foundational for cybersecurity resilience. Organisations need a systematic approach to identify, […]

Read More →

Fortinet projects quarterly revenue below estimates, shares fall

Fortinet, the cybersecurity firm, has updated its investors with underwhelming predictions for the second quarter and annual revenue, citing a slowdown in demand as a significant factor. Following this announcement, shares dropped by 10% in after-hours trading. The midpoint of their revenue forecast fell below market expectations, highlighting ongoing pressures in the cybersecurity sector amidst […]

Read More →

DEI may go largely unchanged despite Trump attacks, Littler says

Diversity, equity, and inclusion (DEI) initiatives are facing political scrutiny, especially with the Trump administration’s recent moves to roll back such programs. However, according to Littler Mendelson’s annual employer survey, most companies are sticking to their DEI strategies despite increasing litigation concerns. Key Points Nearly 45% of employers report no intention to roll back DEI […]

Read More →