New online training helps board members to govern cyber risk – NCSC Blog
The NCSC’s CEO, Richard Horne on the new cyber governance resources giving Boards the tools they need to govern cyber security risks. – Read More
The NCSC’s CEO, Richard Horne on the new cyber governance resources giving Boards the tools they need to govern cyber security risks. – Read More
The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be confused with an Android banking trojan of the same name)…
Microsoft is looking to permanently abandon password-based user authentication, replacing it with a system that uses access keys and identity confirmation methods based on biometrics. According to a post on…
It was 2003, and I was giving my first cybersecurity presentation at an industry conference in Chicago. I talked about the onslaught of worms and viruses at the time (MSBlast,…
Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new features to evade detection and establish persistence on compromised systems. “Hijack Loader released…
Scottish Suits? Legal Cheek readers may be interested in a new drama confirmed by the BBC, which follows the lives of young lawyers working Scotland’s “high-octane” legal scene. The BBC’s…
Transportation facilities and networks slowly adapt to changes and threats, leaving them vulnerable to agile cyberattackers, as demonstrated by the $10 million ransomware attack. – Read More
KEY TAKEAWAYS: Review exclusions from liability caps embedded in other provisions such as those often found in confidentiality sections that often have other obligations such as those on data security…
Google has introduced a new end-to-end encryption (E2EE) feature in Gmail, enabling organizations to send encrypted emails that even Google cannot read to other Gmail users. Later this year, the…
Law firms should adopt a ‘legitimate provenance of wealth test’ when taking on clients as part of an ethics-based approach that goes beyond legal or regulatory tests. The post Law…
Solicitors for leading insurers have been accused of data protection breaches in collating evidence about the way a North London firm pursued personal injury claims. The post DWF accused of…
The first solicitor prosecuted for ‘tipping off’ a client about a money laundering investigation has now been suspended for allowing a client to use his firm’s account as a banking…
A deputy district judge who took nearly three years to hand down a judgment would have been removed from office had she not resigned, according to the Judicial Conduct Investigations…
Despite engaging a lawyer, some clients want to take the lead and on occasion you meet a client who thinks they know better than you. This is particularly so if…
The new Google Workspace features will make it easier for enterprise customers to implement end-to-end encryption within Gmail. – Read More