In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Start ups Launching a cyber-start up during lockdown

SOC.OS, a spin-off from BAE Systems Applied Intelligence, has benefited from the experience of launching during the Coronavirus lockdown

Risk management What does the “new normal” for Risk and Resilience professionals look like?

"We need to focus on people.  We need to make sure people know why that control is in place".   …

BYOD How to embrace BYOD without compromising cyber security

As the remote workforce continues to expand globally, employers need to ensure that the Bring Your Own Device strategies that …

Risk management How can organisations increase their awareness of future critical risks?

"Look at the big areas of risk and choose which ones you're going to plan for, and which ones you're …

Risk management What will the new normal be for Risk and Resilience professionals?

"You can't extract operations and strategy and look at them differently" Ahead of teissR3 | Resilience, Response and Recovery Online …

DevOps How to minimize security breaches when building in containers

Building apps using containers involves a number of common security risks but there are ways of minimising and mitigating these.

Leadership “The role of the CISO is to enable business”

"Moving myself out of my security 'ivory tower' was one of the best things I ever did"   Dr Paul …

Breach Adding a human layer to data security in government organisations

Tony Pepper, CEO of Egress, describes a people-centred approach to preventing accidental or malicious email data breaches.

Cloud security With their head in the cloud, organisations must keep their foothold on security

The coronavirus pandemic has not only fundamentally shifted the way we interact, but also highlighted the power of human connection. …

Data protection Balancing data security and productivity in the workplace

The majority of data held by organisations is unstructured or "dark" data. Making it visible enhances its security and enables …

Authentication The touchless office: another argument for going passwordless

Xavier Coemelck at Entrust Datacard describes his vision of a "touchless" future with passwords replaced by trusted digital identities.

Artificial Intelligence Over 30 years after the ‘first’ attack, the cyber threat landscape reaches the next...

The world’s’ first cyber-attack’ hit the headlines in 1988. It was the Morris Worm – a personal project of the …