Podcast Are most of Microsoft 365’s security tools useless? Thom Langford and Javvad Malik discuss.

On this week’s teiss Security Leaders Roundtable Podcast - Thom Langford, Founder of (TL)2 Security Ltd and Javvad Malik, Security …

Data privacy U.S. Treasury Secretary urges Apple and other tech companies to work with law enforcement

Apple Inc and other technology companies should cooperate with U.S. investigators, Treasury Secretary Steven Mnuchin said on Wednesday as law …

Breach PII of thousands of British professionals left exposed on unprotected Amazon database

Personal and employment details of thousands of British professionals as well as data stored by several British consulting firms were …

Threats NSA uncovers critical security vulnerability affecting all Windows 10 versions

The U.S. National Security Agency (NSA) has discovered a critical security vulnerability named CVE-2020-0601 in Microsoft's Windows 10 and Windows …

Information Security What does the 2020 threat landscape look like?

Andy Swift, Head of Offensive Security at Six Degrees, discusses the cyber security trends he believes you should prepare for …

Employee risk What are the new data risks in the next-gen workplace?

Jon Fielding, Managing Director, EMEA, Apricorn, looks into the new risks in the next-gen workplace. With the oldest members of …

Cyber attack Cyber security trends to look out for in 2020

Technology plays a larger part in our society than ever before, and what better way to kick off the New …

Cyber security Paranoid or pertinent? Why the time is right to take a zero trust approach to security

Darran Rolls, CTO, SailPoint focuses on the rise of the zero trust model in cyber security. Zero trust is a …

Cyber crime Doorbuster or doppelgӓnger: How to detect attacks that deceive via discount 

Justin Fier, Director of Cyber Intelligence & Analytics discusses why the frenzy of passwords, money and credit card information changing …

Hacking How to tackle cyber threats at the Rugby World Cup

As the 2019 Rugby World Cup approaches in Japan, David Warburton, F5 Networks Senior Threat Research Evangelist, considers the multiple …

Smart home technology Smart home security: whose responsibility is it?

Consumers today probably don’t consider their homes to be “smart”. The reality, however, is that connected or internet of things …

Cryptojacking Best security methods to avoid becoming the next cryptojacking victim

What are the best security methods to help organisations avoid becoming the next cryptojacking victim? Paddy Francis, CTO – Airbus …