Best Technologies for Automating CVE Discovery and Vulnerability Assessment

This resource explores the most effective technologies and tools used to automate CVE (Common Vulnerabilities and Exposures) discovery and vulnerability assessments, offering guidance for organisations seeking to enhance their security posture through automation. Automating the discovery of CVEs and performing vulnerability assessments is essential in modern cybersecurity practices. With the ever-growing threat landscape, relying on […]

Read More →

UK Data Security And Compliance In A Digital First Environment

The rapid shift to digital across many industries has placed in-house legal teams in a uniquely complex position. Cybersecurity is no longer just an IT concern; it’s critical for legal professionals to manage sensitive data and comply with ever-evolving regulations effectively. Key Points Legal teams must integrate cybersecurity into their risk mitigation strategies to prevent […]

Read More →

New Legislation Introduced, Federal Reserve Revises Guidance and SEC Hosts Custody Roundtable

Summary As Congress returns from recess, a flurry of new legislation has emerged, including initiatives to shape federal blockchain policies and combat financial scams. The Federal Reserve has significantly reshaped its supervisory approach to crypto activities, while the SEC has hosted a roundtable discussing the modernisation of custody frameworks for digital assets. This series of […]

Read More →

How a Moldovan startup could help protect democracies

This article explores how a Moldovan startup, LexChain, is stepping up to secure sensitive data and enhance cybersecurity, particularly in democracies under threat. In a time where cyberattacks are rampant, their innovative solutions could be a game changer for governments and businesses alike. Key Points LexChain combines encryption, data fragmentation, and blockchain verification to enhance […]

Read More →

The Week Ahead: Congress examines CISA budget; events on Pentgon’s CMMC program

This week in cybersecurity, Congress is ready to dissect the budget for CISA, while discussions on the Pentagon’s CMMC programme are heating up. On Thursday, the House Appropriations subcommittee will delve into CISA’s financial plans with acting director Bridget Bean chiming in. Plus, get ready to hear lawmakers challenge Secretary Kristi Noem about the broader […]

Read More →

Proposed Trump fiscal 2026 budget cuts CISA funding by $491 million to refocus agency mission

The Trump administration’s proposed budget for fiscal 2026 suggests cutting $491 million from the funding allocated to the Cybersecurity and Infrastructure Security Agency (CISA). This move is aimed at refocusing the agency’s mission on securing federal networks and critical infrastructure. A specific mention in the proposal notes the elimination of CISA’s disinformation offices, framed as […]

Read More →

Government Security Warning Issued As Password And 2FA Hackers Strike

Ransomware gangs are back at it again, targeting major retailers across the UK. The National Cyber Security Centre (NCSC) has stepped in with a serious warning and urgent advice for companies to fortify their security measures. This is particularly crucial as platforms are being infiltrated by hackers looking for compromised passwords and stolen two-factor authentication […]

Read More →

Right-to-work checks and the gig economy: what employers need to know

Summary The Home Office has unveiled plans to extend right-to-work checks to gig economy and zero-hours workers, reflecting a significant change in compliance for UK employers. Traditionally focused on full-time employment, these checks are now crucial for all forms of work, including flexible and contract-based roles. Employers must ensure compliance or face substantial penalties, including […]

Read More →

Security Researchers Warn a Widely Used Open Source Tool Poses a ‘Persistent’ Risk to the US

Summary Cybersecurity experts have raised alarms over the use of easyjson, an open-source tool popular in the US government and various American industries. Linked to the sanctioned Russian VK due to its management by Russian developers, concerns grow about potential data breaches or cyber exploits. Despite its critical role in tech infrastructure, its ties to […]

Read More →