The latest Information Security news relevant to Information Security Leaders.

Cyber security Where should accountability for OT security fall within an organisation?

In today’s connected world everything, from power grids and public transport to manufacturing and logistics, has had an upgrade to …

Cyber security How does The Infosec Color Wheel fit within the DevOps paradigm

"Security is viewed more and more not as an additional skill, but as part of the normal skill set that …

Cyber security What are the benefits of the Infosec Color Wheel?

What are the benefits of the Infosec Color Wheel?  Sebastian Avarvarei, Director - Advisory Security Services at Wolters Kluwer, discusses …

Cyber security How to weave cyber security into the fabric of the business

In the last few decades, a significant shift in corporate hierarchies fundamentally altered how organisations operate. This restructuring began within …

Cyber security The Quick and the Dead: Future-Proofing SecOps

The quick and the dead is an English phrase from William Tyndale’s translation of the New Testament. The word quick, …

Cyber security ISF cyber security resources to survive the COVID-19 pandemic

Sponsored by ISF
Our friends at the Information Security Forum (ISF) have compiled some useful resources to keep you and your businesses secure …

Cyber security teissAwards2020…and the winners are?

The teissAwards2020 – our inaugural awards’ ceremony – proved to be a resounding success. The glamorous affair took place on …

Cyber security Zooming in on UEBA: answering the ‘what’ and the ‘how’

Sponsored by ManageEngine
What is UEBA? User and entity behaviour analytics (UEBA) is a relatively new category of cybersecurity tools that utilise machine …

Cyber security Why MITRE ATT&CK™ is the cybersecurity framework of 2020

Sponsored by Immersive_Labs
Security fragmentation is one of the biggest issues facing cybersecurity leaders today. The threat landscape is growing rapidly – there …

Cyber security Are you using DMARC? If not, why not?

Why aren’t more companies using DMARC? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information Security at Canon …

Cyber security Paranoid or pertinent? Why the time is right to take a zero trust approach to security

Darran Rolls, CTO, SailPoint focuses on the rise of the zero trust model in cyber security. Zero trust is a …

Cyber security Is the open-source technology Zeek, one of the most trusted but underappreciated tools in...

Is the open-source technology Zeek, one of the most trusted but underappreciated tools in security? Gregory Bell, CEO at Corelight, …