Fiona Phillips reviews a new book investigating just who is behind the chaos sown by hackers Anyone who works in cybersecurity will be familiar with the enduring stereotype of the teenage boy hunched in a dark bedroom, headphones on, fingers flying, wreaking global havoc between homework assignments. In Ctrl + Alt + Chaos, Joe Tidy…

Read More… from Ctrl + Alt + Chaos: How teenage hackers hijack the internet

Wes Walker and Freya Ollerearnshaw look at how injunctions can be helpful in response to a cyber attack Picture this: you’re an executive facing a nightmare cyber-attack scenario. An email has just hit your inbox from an unknown perpetrator claiming to have hacked your systems and stolen data. They are demanding a ransom: if you…

Read More… from Taking the Hackers to Court: Why Injunctions Should Be Part of Your Cyber Response Playbook

Jack Barradell-Johns walks through a revealing example showing how AI integration can cause vulnerabilities in commonly used tools Introduction SharePoint is a Microsoft platform that enables collaborative working and information sharing. This is done with team sites. They work like regular intranet pages with graphics and text, but they also give you places to store…

Read More… from Exploiting Copilot AI for SharePoint

As data centres become a critical part of our infrastructure, Peter Dalton, Adil Tirmizi and Sophia Wah review the current risks and regulations around them. Demand for data centres continues to grow globally, driven by increased computing requirements for AI and continued demand for data and connectivity, the trend towards cloud computing and IOT capability….

Read More… from Data centres: emerging risks and regulation

Mark Hendry explains how good AI governance is a now cornerstone of cybersecurity AI is already embedded into our day-to-day personal and professional lives. As adoption expands, so do questions about how to govern its use within and across organisations. With the horse having already bolted, will attempts at governance be meaningless, after-the-fact endeavours for…

Read More… from Turning AI Governance and Observability into Business Advantage

The Clorox Company (Clorox) recently filed a $380 million lawsuit against Cognizant, its IT services provider. In this article, Ngaire Guzzetti, discusses the importance of contract due diligence, continual testing of controls and the growing threat that is supply chain risk. The 2023 Breach and the 2025 Lawsuit Manufacturer The Clorox Company (Clorox) recently filed a…

Read More… from Why is the Clorox Lawsuit Against Cognizant a Wake-Up Call for Third-Party Cyber Risk?

Camilo Artiga-Purcell flags up some of the cybersecurity, data protection and privilege risks associated with client-intake forms. Solicitors and barristers across England and Wales have embraced digital transformation, adopting sophisticated case management systems, e-discovery platforms, and document automation tools. Yet many overlook a critical vulnerability: the web forms used to collect confidential client and prospective…

Read More… from Attorney-Client Privilege at Risk: The Hidden Danger in Digital Intake Forms

Rachael Gibbons and Rory Coutts pick out the key points of the Cyber Security and Resilience Bill currently in Parliament. The Background to the New Bill On 12 November, the Government introduced the Cyber Security and Resilience Bill (“Bill”) to Parliament to update the UK’s current cybersecurity law, The Network and Information Systems Regulations 2018…

Read More… from UK Cybersecurity Reform: Incoming Changes via the Cyber Security and Resilience Bill