 
                                Research directions in cybersecurity to support a digital strategic autonomy
Resilience, technological sovereignty and leadership are essential for the EU and as such, they are addressed by the EU Cybersecurity Strategy. In an effort to support this …
 
                                Encryption is either secure or it’s not – there is no middle ground
The principle of end-to-end encryption underpins a system of communication where only the communicating users can read the messages. To this end, it exists to prevent any …
 
                                Mobile providers exposing sensitive data to leakage and theft
Data exposure is a significant, unaddressed problem for Europe’s top mobile providers and, by extension, more than 253 million customers who sign up for their services and …
 
                                Quantum computing and encryption: Key to achieving resilience, technological sovereignty and leadership
Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, …
 
                                Why pseudonymisation is important to protect personal data?
The European Union Agency for Cybersecurity (ENISA) released its report on pseudonymisation for personal data protection, providing a technical analysis of cybersecurity …
 
                                International law enforcement effort pulls off Emotet botnet takedown
Law enforcement and judicial authorities worldwide have effected a global takedown of the Emotet botnet, Europol announced today. “The Emotet infrastructure essentially …
 
                                35% of organizations believe the NIS Directive expectations are unclear
The European Union Agency for Cybersecurity (ENISA) released a report on information security spending for network and information services (NIS) under the NIS Directive, the …
 
                                Researchers break Intel SGX by creating $30 device to control CPU voltage
Researchers at the University of Birmingham have managed to break Intel SGX, a set of security functions used by Intel processors, by creating a $30 device to control CPU …
 
                                Guide: Security measures for IoT product development
The European Union Agency for Cybersecurity (ENISA) released its Guidelines for Securing the IoT, which covers the entire IoT supply chain – hardware, software and services. …
 
                                Most UK businesses using Oracle E-Business Suite are running old systems
The majority of UK businesses using Oracle E-Business Suite (EBS) are running on old versions of the business critical ERP system, according to a Claremont study. Of the 154 …
 
                                Hackers breach psychotherapy center, use stolen health data to blackmail patients
News of an unusual data breach at a psychotherapy center in Finland broke over the weekend, after affected patients began receiving emails telling them to pay up or risk their …
 
                                Data protection predictions for 2021
2020 presented us with many surprises, but the world of data privacy somewhat bucked the trend. Many industry verticals suffered losses, uncertainty and closures, but the …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does