Cyber security “People come first” – Interview with Matt Gordon-Smith, CISO, Gatwick Airport

They say there’s a first time for everything. For me, it was visiting an airport for a purpose that involved …

Hacking The cyber criminals selling network access to the highest bidder

Levi Gundert, SVP of Global Intelligence at Recorded Future , discusses the selling of pay-per-install services on the dark web, …

Cyber attack Hackers acting in Turkey’s interests believed to be behind recent cyber-attacks, sources say

Sweeping cyber-attacks targeting governments and other organisations in Europe and the Middle East are believed to be the work of hackers acting …

IoT Government to draft new legislation to make IoT devices more secure

Digital Minister Matt Warman has announced that the government is set to introduce a new legislation that would put the …

Hacking The cyber criminals selling network access to the highest bidder

Levi Gundert, SVP of Global Intelligence at Recorded Future , discusses the selling of pay-per-install services on the dark web, …

Encryption Specops’ Bitlocker key recovery

Sponsored by Specops
The problem When an employee loses their laptop, the possibility of someone accessing their data by booting it up from …

Information Security 2020 trends: what can we expect for cyber security this year?

As the first month of the year draws to a close, what's on the agenda for the rest of 2020? …

Information Security What does the 2020 threat landscape look like?

Andy Swift, Head of Offensive Security at Six Degrees, discusses the cyber security trends he believes you should prepare for …

Employee risk What are the new data risks in the next-gen workplace?

Jon Fielding, Managing Director, EMEA, Apricorn, looks into the new risks in the next-gen workplace. With the oldest members of …

Cyber attack Cyber security trends to look out for in 2020

Technology plays a larger part in our society than ever before, and what better way to kick off the New …

Cyber security Paranoid or pertinent? Why the time is right to take a zero trust approach to security

Darran Rolls, CTO, SailPoint focuses on the rise of the zero trust model in cyber security. Zero trust is a …

Cyber crime Doorbuster or doppelgӓnger: How to detect attacks that deceive via discount 

Justin Fier, Director of Cyber Intelligence & Analytics discusses why the frenzy of passwords, money and credit card information changing …