Read This

Look at Dael Williamson’s profile and you might wonder, briefly, how he wound up as a Chief Technology Officer: There’s the degree in molecular biology and the masters in structural biology and the research position in structural bioinformatics; here is someone perhaps trying to save the world, who

Days before the exposure this week of over three terabytes of military emails owing to misconfigured Azure services, the US Department of Defense (DoD)’s Inspector General had warned Pentagon CIOs that their teams were not properly reviewing documentation designed to ensure military cloud security – and running systems with unmitigated

A powerful, cross-party axis between Labour and Conservative former leaders could put digital identity cards back on the table. The seemingly unlikely pairing of Tony Blair and William Hague back a new report that calls for the introduction of digital ID cards as well as broad technology-enabled changes to education,

"I see tech vendors using customer naiveté to reproduce 1980s and 90s style lock-in and price gouging."

Hackers appear to be increasingly adopting the Havoc command and control (C2) framework, security researchers say. The open source framework, developed by C5pider, supports the building of offensive agents in several formats including Windows PE executable, PE DLL and shellcode and is an alternative to the paid for (or cracked)