TRPC
Latest about TRPC

The Attention Alchemists: crafting gold from social engineering
By Javvad Malik published
Unravel the art of social engineering through advertising, alchemy, and misinformation in this intriguing exploration.

AI-powered cyber threats demand enhanced security awareness for SMEs and supply chains
By Usman Choudhary published
New sophisticated cybersecurity threats in 2025 require organizations to revisit their defense strategies.

How to combat exfiltration-based extortion attacks
By Wes Hutcherson published
As data exfiltration becomes more prominent, organizations must better protect sensitive data from attackers.

IoT’s botnet problem is up 500% – three things admins must do now
By Apu Pavithran published
Booming devices and weak security create botnet backdoors - but admins can close them.

Getting to grips with Adversary-in-the-Middle threats
By Rafe Pilling published
How do adversary-in-the-middle (AitM) attacks work exactly, and why is it important for organizations to take note of this threat?

Tackling the threat of deepfakes in the workplace
By Simon Jefferies published
Simon Jefferies, Director of Technology, Sharp UK, explains how businesses can tackle deepfakes at work.

Sovereign Cloud: redefining the future of secure digital innovation
By Martin Hosken published
Martin Hosken at VMware explains why true innovation extends beyond mere access to cutting-edge technologies.

Tech deals in 2025: navigating ‘ghost’ discounts and fake reviews
By Rytis Ulys published
Fake tech deals are a big problem and there’s not much we can do about it. Research finds that 75% of tech deals were ‘suspiciously discounted’.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.