In-depth articles, interviews and videos that focus on the role of, or are relevant for, Chief Information Security Officers.

Human factor Technology vs humans: what works for cyber security?

TEISS Head of Consulting, Jeremy Swinfen Green, talks to Martin Smith about the human side of cyber security. At the …

Cyber security Outlining the UK’s cyber security strategy

James Snook, Deputy Director of the Cyber and Government Security Directorate (CGSD) at the Cabinet Office, explains the Government’s cyber …

Artificial Intelligence Is it time to trust AI powered security?

By Paul Griffiths, Senior Director, Advanced Technology Group, Riverbed Technology Last year, Google DeepMind’s AI program AlphaZero took 4 hours to …

Cyber security Cyber security predictions for 2018

Cyber security was thrust into prominence with the biggest attacks ever been seen, in 2017. The fact that so many …

Cyber security Cyber security resolutions for 2018

TEISS guest blogger Sam Reed, chief technology officer at Air IT, shares his pick of cyber security resolutions for 2018. …

IoT The consent and control conundrum in the Internet of Things

By Angeline Hayles-Henderson, Solicitor, Birmingham City Council There is no doubt that the virtues and benefits of  emerging technologies such as …

Cyber skills Want to know why there is a skills gap in cybersecurity? Read on…

We hear the words skills gap and skills shortage a lot within the cybersecurity industry. It is almost everyday that …

Cyber crime Know your customer: Tackling the anti-money laundering alert overload

By Andrew Davies, VP, Global Market Strategy, Financial Crime Risk Management, Fiserv This summer saw the introduction of the fourth …

Cloud security Managing vulnerabilities in the Cloud… and everywhere else

By Gidi Cohen, CEO and Founder of Skybox Security Security professionals are in a pickle. Along with IT teams, they’re getting …

Hacking The ghosts of users past present perfect route into businesses, for hackers

by Matt Lock, Director of Sales Engineers, Varonis High profile ransomware attacks are never far from the headlines these days, but …

Cloud security The ‘unprepared’ path to digital transformation and cloud

-By Ashwin Krishnan, Senior Vice President of Product Management, Strategy, Technical Marketing at HyTrust A tale of how non-technology companies …

Passwords How to solve the passwords storage problem

 -By Ian Harvey, Software Design Authority, Thales eSecurity Storing passwords is more complex than it might sound. For organisations, protecting …