Cyber risk Huawei equipment deployed in the UK riddled with underlying defects, finds HCSEC

The Huawei Cyber Security Evaluation Centre (HCSEC) has noted in its latest report that underlying defects continue to persist in …

Quantum computing How crypto-agility can prevent the Quantum Apocalypse

The Quantum Apocalypse may destroy common encryption techniques unless quantum-safe crypto algorithms are developed.

Risk management Communicating cyber risk to the board

What is the best way to communicate these risks with the board? “The true business impact of an risk needs …

Culture Do your workers to treat your information security controls as wishful thinking?

Flummoxed by why your people keep violating seemingly obvious personal security rules? It might be because broken processes and ineffective …

Insider threat Insiders, economic uncertainty and company data – a recipe for disaster?

There are a number of classic giveaways that point to an employee behaving in a way that could indicate they …

Insider threat Insider breaches threaten lasting digital transformation

Sponsored by Egress
The new normal has enhanced digital transformation and amplified risk. Organisations need to address insider security to achieve lasting resilience. …

Cyber attack Understanding and mitigating the cyber threat to manufacturers

Manufacturers are attractive targets for cyber criminals, competitors and nation state actors. Understanding the nature of the threat they face …

Threat intelligence Threat hunting or threat detection: what’s more important?

Sponsored by IBM
Threat hunting is computationally expensive while threat detection can run in the background. But that’s hardly the full story. Join …

Threat intelligence Determining the landscape of attacks

Sponsored by IBM
“Yet another framework, yet another set of terminologies…” Join us as we discuss cyber security databases and the effectiveness of …

Phishing Counting the cost of cyber-attacks in the pandemic era

As the threat posed to our health posed by COVID-19 increased, so did the number of cyber-attacks targeting notable organisations …

Malware How a new open-source tool can help businesses in the fight against malware

Sponsored by Blackberry
New software from BlackHat makes reverse-engineering malware faster and easier for software engineers. Reverse-engineering of malware is an extremely time- …

Quantum computing How to prepare your organisation for the quantum computing era

Within the next few years a quantum computer will crack encryption. This once in a generation event will, in a …