ISA to celebrate fourth annual International Automation Professionals Day on April 28

The International Society of Automation (ISA) is gearing up to honour automation professionals worldwide with its fourth annual International Automation Professionals Day on April 28. This digital event celebrates the crucial contributions of automation experts across various sectors, including manufacturing, engineering, cybersecurity, and more. Source:ISA Announcement Key Points The event takes place on April 28, […]

Read More →

The Reckoning Of Cybersecurity: Are We Gaming With Fire? [Guest Newsletter Editor]

The Reckoning of Cybersecurity: Are We Gaming with Fire? The gambling industry finds itself at a critical juncture in cybersecurity. As CEOs and senior executives, we must recognize the potential complacency about our digital defenses, gambling with fire when it comes to protecting our most valuable assets – our customers’ data and operational integrity. Recent […]

Read More →

What does the DOJ final rule on protecting Americans’ sensitive data from foreign adversaries really mean for global business?

The U.S. Department of Justice has introduced its final rule aimed at safeguarding sensitive data from foreign adversaries, which is now in effect. Implemented on 11 April, this rule encompasses a blend of U.S. sanctions and cybersecurity regulations, but its complexities leave many in the legal and privacy sectors scratching their heads. A limited enforcement […]

Read More →

Slings and Arrows: Trade Secret Trends Reflect a Need for Safeguards

This article explores the increasing significance of trade secrets in the context of cybersecurity threats and shifting legal landscapes. With an uptick in data breaches and a potential overhaul of noncompete agreements, businesses must adapt their intellectual property strategies to guard against new challenges. Source: Lexology Key Points Trade secret enforcement is becoming increasingly critical […]

Read More →

Teach young people about ransomware risks before they enter work, expert urges

Cybersecurity expert Matt Cooke stresses the need for better education regarding ransomware and cyber threats for young people about to enter the workforce. He argues that while awareness is improving among organisations, proactive measures must be taken to prepare the youth effectively. Source: The Independent Key Points Experts believe younger generations should be taught about […]

Read More →

From Academia to Industry: Sahiti Bommareddy’s Open-Source Revolution in Power Grid Security

The increasing complexity of cyber threats targeting critical infrastructure has made securing power grids and distributed systems more urgent than ever. Sahiti Bommareddy, a Ph.D. candidate in Computer Science at Johns Hopkins University, leads the charge with her work on Byzantine-resilient systems—technologies destined to transform power grid security against cyberattacks and operational failures. The Inspiration […]

Read More →

Computer Crime and Telephone Scams: Advancing Legal Frameworks with the Second Royal Decree

The Thai government has taken significant steps to bolster its fight against cybercrime with the introduction of the Second Royal Decree, which came into effect on April 13, 2025. This new directive enhances existing legal frameworks put in place earlier and aims to tackle the evolving landscape of digital fraud, particularly as cyber scams continue […]

Read More →

FCDO tech minister: ‘AI will create new and enhance existing cyber threats’

Jones, the tech minister of the FCDO, acknowledges the double-edged sword of AI. While it’s set to revolutionise the UK’s diplomatic efforts, it also raises significant cybersecurity concerns. By deploying AI, the FCDO aims to streamline processes and enhance efficiency but must also confront evolving cyber threats. Source: Public Technology Key Points AI is expected […]

Read More →

Crosswalk Hacks: A Wake-Up Call for Government IoT Security

Viral videos featuring hacked crosswalks with cheeky messages may seem amusing, but they underscore a serious cybersecurity vulnerability in local government infrastructures. This article shines a light on how they were compromised and the implications for smart city technologies. Key Points Recent pranks in cities like Palo Alto and Seattle feature altered crosswalk announcements from […]

Read More →