Education Is the end-user smart enough to make security decisions?

Is the end-user security savvy enough to make their own decisions? Should security choices be left to the end-user? At …

Mobile security Security Leaders discuss the Whatsapp Pegasus breach

Should we really worry if Whatsapp is breached? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information Security …

Podcast Are most of Microsoft 365’s security tools useless? Thom Langford and Javvad Malik discuss.

On this week’s teiss Security Leaders Roundtable Podcast - Thom Langford, Founder of (TL)2 Security Ltd and Javvad Malik, Security …

Education Should cyber security begin at school? And from what age?

How adequate is the public's cyber security awareness? How early in life should security education begin? Whose responsibility is it …

Mental health What’s the impact of a breach on your staff?

News headlines tend to focus on how a breach impacts a company's market value or reputation...but what about the internal …

Cyber security Are you using DMARC? If not, why not?

Why aren’t more companies using DMARC? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information Security at Canon …

Malware Why NotPetya was a really good piece of malware

What made NotPetya a really good piece of malware? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information …

CISOs Security leaders break down the role of the CISO

How do you define the role of the CISO? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information …

Supply chain How to deal with the complexity of supply chains

How can we deal with the complexity of supply chains? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of …

Podcast Could deepfakes be good for cyber security?

This week we are exploring the weird world of deepfakes - one of the latest ways cyber criminals are exploiting …

Policy 3 CISOs discuss bad policies and the stupid questions they’re asked

3 CISOs discuss bad policies, the stupid questions they’re often asked and why the adversary is sometimes a member of …

Fake news Is fake news a cyber security challenge?

Is fake news a cyber security issue? Should cyber security professionals be held responsible for stopping the spread of misinformation? …