As organisations increasingly migrate to the cloud, securing sensitive data has never been more critical. While cloud computing offers flexibility and scalability, it also opens the door to a range of security risks. From simple misconfigurations to complex insider threats, cloud security breaches have cost companies huge sums of money and compromised millions of users’ […]
Sarah Armstrong-Smith has built a career on risk management, resilience, and staying ahead of evolving cyber threats. As a leading cybersecurity speaker and chief security adviser at Microsoft Europe, she has spent more than two decades helping businesses navigate digital transformation while strengthening their security posture. We spoke with Sarah to explore the biggest cybersecurity […]
The EU’s Digital Operational Resilience Act (DORA) regulation came into full effect on January 17, 2025, two years after its official adoption. The regulation aims to strengthen the resilience of the financial sector against various digital risks, including cyber threats and technology failures. It establishes a comprehensive framework that requires financial institutions to put in […]
Researchers from ETH Zurich have uncovered significant security vulnerabilities in several widely used end-to-end encrypted (E2EE) cloud storage services. The cryptographic flaws could allow attackers to bypass encryption, compromise file confidentiality, tamper with data, or even inject unauthorised files into users’ storage. The study analysed five E2EE cloud storage providers—Sync, pCloud, Seafile, Icedrive, and Tresorit—which… Read more »
NordVPN has integrated post-quantum cryptography into its Linux application, marking an early adoption of this technology in the consumer VPN market. This move addresses growing concerns about the potential for future quantum computers to break current encryption standards, potentially compromising sensitive data. The update, released in late September, introduces post-quantum cryptography to NordVPN’s Nordlynx protocol.… Read more »
The internet was built in more simple, innocent times and was seized on by a curious mixture of visionaries, educators, academics and technology geeks as a way to democratise the distribution of information. Decades later, the protocols that govern this interconnected network of private networks remain much the same, but the makeup of the inhabitants… Read more »
As organisations worldwide continue to grapple with an ever-expanding threat landscape, understanding the latest cybersecurity trends has never been more crucial. Ahead of Cyber Security & Cloud Expo Europe, Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, shed light on the shifts in cybersecurity over the past five years and offers valuable insights… Read more »
As businesses increasingly rely on cloud technologies, ensuring secure and efficient global connectivity is paramount. GNX, a provider of global internet and private connectivity solutions, is addressing this challenge head-on. Ahead of Cyber Security & Cloud Expo Europe, CloudTech caught up with Rick Mur, Co-Founder & CTO of GNX, to discuss the evolving landscape of… Read more »
Tech giant Google has been cooperating with Australia’s national science agency, the Commonwealth Scientific and Industrial Research Organisation (CSIRO), to mitigate the spread of digital risks. The two parties are focused on devising revolutionary digital tools for hospitals, defence organisations, and energy providers, which are considered critical infrastructure operators. These tools would be able to… Read more »
The UAE hopes to introduce three new policies to enhance the country’s existing cybersecurity framework. According to the Emirates News Agency, the proposed policies will concern the domains of cloud computing, data security, IoT security, and cybersecurity operations centres. Even though the inner workings of these rules are not yet known, it is safe to… Read more »