Putting staff welfare at the heart of incident response
Guidance for staff responsible for managing a cyber incident response within their organisation. Read the full article →
Guidance for staff responsible for managing a cyber incident response within their organisation. Read the full article →
If you can’t see your entire operational technology environment, you can’t defend it. New guidance from the NCSC will help you gain that visibility. Read the full article →
How to protect sensitive information about your setting and the children in your care from accidental damage and online criminals. Read the full article →
Europe can’t end poverty if it ignores digital poverty Guido Appoldt, Shanghai Jiao Tong University, China Ronald Musizvingoza, United Nations University Institute, Macau SAR, China PUBLISHED ON: 24 Sep 2025 The missing dimension in Europe’s war on poverty Europe is losing its war on poverty because daily life has shifted online, and a new front has…
Locked out again – a pattern of digital exclusion Across the African continent, young professionals, entrepreneurs, and freelancers are increasingly reporting unexplained suspensions1, account shutdowns, or impossible-to-navigate verification loops – mostly on platforms like LinkedIn. LinkedIn’s rollout of ID verification, supposedly for protection against bot or scam accounts, has now – intentionally or unintentionally –…