Opinion
Latest about Opinion

Invincible season 3 changes Oliver Grayson's shocking coming-of-age moment from the comics for the better – and for the worse
By Tom Power published
Invincible season 3 episode 3's most important scene was more impactful and less effective than its comic book counterpart.

AI-powered cyber threats demand enhanced security awareness for SMEs and supply chains
By Usman Choudhary published
New sophisticated cybersecurity threats in 2025 require organizations to revisit their defense strategies.

How to combat exfiltration-based extortion attacks
By Wes Hutcherson published
As data exfiltration becomes more prominent, organizations must better protect sensitive data from attackers.

IoT’s botnet problem is up 500% – three things admins must do now
By Apu Pavithran published
Booming devices and weak security create botnet backdoors - but admins can close them.

The leaked Sonos streaming box could be a huge hit for custom home theaters, if it adds 2 key missing features from the current line-up
By Matt Bolton published
If the rumors are true, I hope Sonos goes hard on home theater Dolby Atmos – but it'll need something more.

Getting to grips with Adversary-in-the-Middle threats
By Rafe Pilling published
How do adversary-in-the-middle (AitM) attacks work exactly, and why is it important for organizations to take note of this threat?

Tackling the threat of deepfakes in the workplace
By Simon Jefferies published
Simon Jefferies, Director of Technology, Sharp UK, explains how businesses can tackle deepfakes at work.

Sovereign Cloud: redefining the future of secure digital innovation
By Martin Hosken published
Martin Hosken at VMware explains why true innovation extends beyond mere access to cutting-edge technologies.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.