LATEST EDITION

GPSJ SPRING 2025

July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  

Archives

Marks & Spencer’s £300M cyberattack should be a stark warning to all organisations

By Claire Agutter, Scopism

The cyberattack against Marks & Spencer, which caused damages beyond £300 million and operational disruptions until July, serves as a ‘red alert’ for all public and private organisations. The attack revealed fundamental weaknesses in trust levels and operational stability alongside compromised data protection. The National Crime Agency’s investigation into Scattered

Continue reading Marks & Spencer’s £300M cyberattack should be a stark warning to all organisations

Why “Best Practice” is Failing to Protect Personal Data: A Call for Data-Centric Security

The recent cyberattacks on London councils have exposed a fundamental weakness in today’s cybersecurity strategies. Despite organisations investing heavily in perimeter defences such as firewalls, anti-phishing measures, and zero-trust policies, cybercriminals continue to breach these barriers. The reason? Traditional best practices focus on keeping attackers out, rather than protecting what truly matters; the data

Continue reading Why “Best Practice” is Failing to Protect Personal Data: A Call for Data-Centric Security

Specialist reseller TripleComm adds Darkscope’s cyber threat intelligence to its solutions roster

UK specialist solutions provider TripleComm has added Darkscope’s cyber threat intelligence solutions to its long-standing roster of network-focused solutions. Darkscope’s portfolio adds specific cybersecurity capabilities to TripleComm’s services for the first time.

Chris Plastiras, director at TripleComm, commented: “We’re very selective about the solutions we choose for our clients, so it’s a measure of

Continue reading Specialist reseller TripleComm adds Darkscope’s cyber threat intelligence to its solutions roster

The Importance of Public-Private Partnerships for Cybersecurity

SolarWinds Vice President, Government Affairs Chip Daniels

In early December 2020, nation-state threat actors exploited SolarWinds software in an unprecedented cyberattack – an event known today simply as SUNBURST.

It shone a light on the concerning new reality for the software industry – that previously unforeseeable attacks were becoming increasingly sophisticated, striking at

Continue reading The Importance of Public-Private Partnerships for Cybersecurity

Mitigating supply chain attacks: protecting the software development cycle

Eilon Elhadad

The National Cyber Security Centre (NCSC) has issued practical steps to help tackle the significant increase in the number of cyberattacks resulting from supply chain vulnerabilities. To support this initiative, companies should minimise the complexity of the process, choose as few security vendors as possible, and build adoption programs, explains Eilon

Continue reading Mitigating supply chain attacks: protecting the software development cycle

Understanding the Future of IT in Defence

By Charles Damerell, Senior Director UKI at SolarWinds

In responding to the demand for better digital capabilities, defence organisations are among many across the public sector to have seen significant recent changes in their technology strategies and investment choices.

This has delivered a wide range of benefits, such as enabling the sector to cope with

Continue reading Understanding the Future of IT in Defence

Annual SolarWinds Study Reveals Opportunities for Business and IT Collaboration in Managing Enterprise Risk Driven by Internal and External Security Threats

SolarWinds IT Trends Report 2021: Building a Secure Future examines how technology professionals perceive the evolving state of risk in today’s business environment following internal impact of COVID-19 IT policies and exposure to external breaches

SolarWinds introduces Secure by Design program as a guide for industry-wide approach to help prevent

Continue reading Annual SolarWinds Study Reveals Opportunities for Business and IT Collaboration in Managing Enterprise Risk Driven by Internal and External Security Threats