Five worthy reads: Confidential computing – The way forward in cloud security

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In light of rising concerns over cloud cybersecurity, this week we explore the concept of confidential computing.
The past y… Continue reading Five worthy reads: Confidential computing – The way forward in cloud security

Five worthy reads: Supply chain cyberwarfare

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we are exploring the concept of supply chain cybersecurity in a time when there is a rising number of …
The post F… Continue reading Five worthy reads: Supply chain cyberwarfare

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we explore the concept of cybersecurity in… Continue reading Five worthy reads: Preparing an incident response plan for the pandemic and beyond