In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Phishing Top tips: how to spot phishing scams

TEISS guest blogger, Eyal Benishti, CEO and Founder of IRONSCALES, outlines six top tips on how to spot phishing scams.  Phishing …

Wannacry WannaCry, one year on…can we ever trust the NHS?

Almost a year on from the WannaCry ransomware attack, TEISS talks with Kevin Cunningham, Chief Strategy Officer and Co-Founder of SailPoint about cyber …

Brexit How will Brexit affect Cyber Security?

Will Brexit affect cyber security? That was a question posed during #teissLondon2018. The discussion briefly touched on Brexit as an …

Artificial Intelligence Meet the augmented security analyst

Martin Borrett hosted a roundtable at the recent TEISS2018 event entitled "AI, machine learning and the possibilities it opens up …

Supply chain 5 ways to reduce third party risk in the supply chain

Jon Fielding, Managing Director EMEA, Apricorn Enabling partners in a supply chain to share information and collaborate is crucial to a …

Russia Are we in a new Cold War?

Tensions are high over the recent nerve agent attack on UK soil on a former Russian spy for which Britain says …

2FA 2FA via SMS is no longer an acceptable standard: why and what’s the alternative? 

Jerrod Chong, SVP of Product at Yubico, explains to TEISS why 2 Factor Authentication (2FA) via SMS is no longer an acceptable standard.  We've all been …

Cyber attack How can your business respond when under attack?

Sponsored by SungardAS
Chris Butler, Principal Consultant, Cyber Resilience and Security, Sungard Availability Services  To quote Warren Buffet, it takes 20 years to …

Hacking Myth busting: The top ten things you never knew about ethical hacking

By Laurie Mercer, solutions engineer at HackerOne Legend has it that the original definition of ‘Hacker’ was “someone who makes …

Supply chain How to build security into your software supply chain

By Joe Jarzombek, Director for Government, Aerospace & Defense Programs at Synopsys The supply chain; that is, the sequences of …

BYOD Are Wi-Fi enabled devices compromising your business network?

Daren Oliver, cyber security expert and managing director of Fitzrovia IT, discusses how Wi-Fi enabled devices and the ‘Internet of …

Cloud security Insider mistakes cast shadow over cloud security

By Matt Middleton-Leal, GM EMEA, Netwrix Corporation More and more organizations are ready to commit sensitive customer data to the …