TechBusinessLive

Menu
  • Home
  • Resources
    • Webinars
    • Blog
    • E-books
  • Contact Us

Latest

No Preview
IT

Companies House restarts online services following cyber breach

Companies House was forced to pull its WebFiling service offline at the weekend after it emerged that a flawed update …
No Preview
IT

This rise of the splinternet? Data sovereignty risks and responses

We look at the political, legal and economic risks around data sovereignty, the fears for digital dependency and massive hyperscaler …
No Preview
IT

Vulnerability reports: Increase in quantity, decrease in quality?

Bug bounties have become a staple of the cyber security toolkit, offering researchers a way to get paid to find …
No Preview
IT

The UK government’s digital identity scheme: Dystopian nightmare or modernised public services?

Critics and supporters of digital ID are honing their arguments for the government’s consultation – but it’s the public that …
No Preview
IT

Iran war a melting pot for other cyber threats

State-backed cyber threat actors from non-combatant states are taking advantage of the Israeli-US war on Iran to fulfil their own …
No Preview
IT

Cyber industry welcomes women, but challenges persist

Three-quarters of women working in security say they feel comfortable in the field, but women are still much more likely …
No Preview
IT

Salesforce tracks possible ShinyHunters campaign targeting its users

Salesforce warns users of an uptick in malicious activity targeting Experience Cloud customers with misconfigured user settings via an open …
No Preview
IT

Confidence in AI-powered cyber must be earned, not assumed

In security, familiar testing and validation approaches are not enough when it comes to AI. The question is not just …

Posts pagination

Prev 1 2 3 4 5 6 … 76 Next

Good Reads

  • Understanding the must-haves of modern data protection
    Go beyond traditional backup and recovery The primary …
  • FlashSystem: The Centerpiece of the IBM One-platform Approach
    Maximizing Economic Efficiency with a Single, Powerful, FlexibleStorage …

Trending

  • Planning Your Migration …
    All-flash storage has rapidly become the predominant mode …
  • What Is Cybersecurity …
    What Is Cybersecurity Insurance? If your company had …
  • IBM FlashSystem family
    The IBM FlashSystem family, is designed to meet …

Get more stuff

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Thank you for subscribing.

Something went wrong.

we respect your privacy and take protecting it seriously

Categories

Copyright © 2026. TechBusinessLive