CISOs fear becoming the next Travelex

If their IT systems were compromised in a cyber security incident, 46.7% of security professionals would not know it had happened, compared to 31.5% who claim they would discover it immediately, and 14.3% within a…

Gartner: Over two-thirds of management tasks will be…

More than two-thirds of the work currently done by managers will be automated, says analyst Gartner. It has predicted that, by 2024, 69% of routine work currently done by managers will be performed by automation…

Gender funding gap reveals complacency in the Nordics

A study by Unconventional Ventures and Dealroom has revealed that far less capital per funding round is achieved among female-only teams in the Nordics, in comparison to male-only or mixed-gender run businesses. As a general…

Seven projects funded to explore CAV security

Connected and autonomous vehicle (CAV) organisation Zenzic, alongside partners Innovate UK and the Centre for Connected and Autonomous Vehicles (CCAV), have named seven projects to receive a £1.2m funding pot to explore cyber security in…

The gender funding gap: complacency in the Nordics

A study by Unconventional Ventures and Dealroom has revealed that far less capital per funding round is achieved among female-only teams in the Nordics, in comparison to male-only or mixed-gender run businesses. As a general…

End-user security ignorance laid bare in new report

Less than a quarter of people aged between 23 and 38 (so-called millennials) can correctly define the term “ransomware”, more than one-fifth of Brits don’t know how to change their Wi-Fi security settings, one-third of…

Six disaster recovery pitfalls and how to avoid…

Disaster recovery (DR) is the ability to return to “business as usual” operations after an IT failure, natural disaster, or other unexpected event, and is a key function of IT. After all, the IT department is…

Startup uses machine learning to support GDPR’s right…

Machine learning startup Mine is using the technology to help internet users see the full extent of their digital footprint and exercise their right to be forgotten under the European Union’s General Data Protection Regulation…