News

"The user must be left in the disabled state for 6 hours to fully invalidate any possible unauthorized access via this ID token feature."

WithSecure CRO warns on post quantum cryptography, as mid-sized firms struggle with attacks on the edge

Multiple Fortune 500 firms breached. Threat group uses remote IT staff, social engineering, trojanised npm packages, even a poisoned "tank game"

"... it is now considered that removing these restrictions can be compliant with data protection requirements."

90% of controls on one trading desk were manual and key processes including trade pricing were "conducted manually, predominantly, in Excel spreadsheets..."

Post-mortem praises Aussie fund's good third-party backups, “speed and precision” from CIO’s team