Opinion
Latest about Opinion
![A padlock resting on a keyboard.](https://cdn.mos.cms.futurecdn.net/yDpezKpJsKYY4a3r9EzAw5-320-80.jpg)
AI-powered cyber threats demand enhanced security awareness for SMEs and supply chains
By Usman Choudhary published
New sophisticated cybersecurity threats in 2025 require organizations to revisit their defense strategies.
![Concept art representing cybersecurity principles](https://cdn.mos.cms.futurecdn.net/JpXukHGqkZ8gapEzDQNqRW-320-80.jpg)
How to combat exfiltration-based extortion attacks
By Wes Hutcherson published
As data exfiltration becomes more prominent, organizations must better protect sensitive data from attackers.
![A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.](https://cdn.mos.cms.futurecdn.net/NGKiUcJVFBC8HkMp9dTo9a-320-80.jpg)
IoT’s botnet problem is up 500% – three things admins must do now
By Apu Pavithran published
Booming devices and weak security create botnet backdoors - but admins can close them.
![Sonos Era 300 close-up of logo](https://cdn.mos.cms.futurecdn.net/LpajDL2o2vdpX6A9vRrEPo-320-80.jpg)
The leaked Sonos streaming box could be a huge hit for custom home theaters, if it adds 2 key missing features from the current line-up
By Matt Bolton published
If the rumors are true, I hope Sonos goes hard on home theater Dolby Atmos – but it'll need something more.
![Representational image of a shrouded hacker.](https://cdn.mos.cms.futurecdn.net/P6nR5BjdpHEUspxkCwTxdc-320-80.jpg)
Getting to grips with Adversary-in-the-Middle threats
By Rafe Pilling published
How do adversary-in-the-middle (AitM) attacks work exactly, and why is it important for organizations to take note of this threat?
![Hands typing on a keyboard surrounded by security icons](https://cdn.mos.cms.futurecdn.net/JsiJrxSjMKfjp2kjQjBwLb-320-80.jpg)
Tackling the threat of deepfakes in the workplace
By Simon Jefferies published
Simon Jefferies, Director of Technology, Sharp UK, explains how businesses can tackle deepfakes at work.
![Cloud computing graphics.](https://cdn.mos.cms.futurecdn.net/rSTmCmeoaSTmeNWWL8GZ8T-320-80.jpg)
Sovereign Cloud: redefining the future of secure digital innovation
By Martin Hosken published
Martin Hosken at VMware explains why true innovation extends beyond mere access to cutting-edge technologies.
![A person using a smartphone with an ecommerce website showing on a laptop.](https://cdn.mos.cms.futurecdn.net/Fjubd6oQm2BLkiwxJd5qSf-320-80.jpg)
Tech deals in 2025: navigating ‘ghost’ discounts and fake reviews
By Rytis Ulys published
Fake tech deals are a big problem and there’s not much we can do about it. Research finds that 75% of tech deals were ‘suspiciously discounted’.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.