Ken Hobbs passes on this internal job advertisement for a systems programming consultant: 'Based within the systems management CICS/IMS/security team, key responsibilities will include the design plan,...
Cryptojackers steal CPU time and bandwidth, but then again so do ads, says RiskIQ
Delegates heard that the digital age 'desperately needs' regulation around technologies like AI and machine learning
Corcoran discusses brain scanners, drones, networks refreshes, and using data to sell more whisky
Cyber crime isn't all about speed: infiltrators are slowing down to avoid detection