Our most recent articles, videos and interviews relevant to anyone working within Information Security.

GDPR Why is GDPR only now making the board pay attention to cyber security?

Dr Guy Bunker, CTO, Clearswift, shows us how the recent, high profile GDPR fines are the reason board members are …

Resilience Perception gaps in cyber resilience: What are your blind spots?

Sponsored by IBM
Explore the grey areas that impact IT security and cyber resilience.   Protecting IT systems and infrastructure against cyber threats …

IT security Five ways to improve security testing against advanced persistent threats

Known as a means to circumvent international sanctions, sophisticated state-sponsored cyber-attacks, or advanced persistent threats (APTs), recently made the headlines, …

Identity protection Identity and security: A perfect match

Barry McMahon, Senior International Marketing Manager at LogMeIn, explores the ongoing challenges that organisations are facing with identity access management. …

Information Security The step-by-step guide to a robust cyber-security strategy

Graham Marcroft, Operations and Compliance Director, Hyve, discusses the 6 steps for any business to achieve a bullet-proof cyber security …

Information Security Machine learning and the future of security

Is machine learning really revolutionising security? Morgan Jay, Area Vice President at Imperva, discusses why machine learning applications matter for …

Information Security How to tackle security in the cloud era

Anurag Kahol, CTO at Bitglass, discusses best practice to help organisations reap all the benefits of the cloud without succumbing …

People A guide to helping people overcome “cyber attack fatigue”

The more that we warn people about threats that don’t manifest in their personal lives, the more likely people become …

Information Security Deploying edge computing architecture? Read this before you jump

Andrew Bargery, Solutions Architect, F5 Networks, discusses what businesses need to think about before jumping into deploying edge computing architecture. …

People Why we all need to hug a hacker

Edwin van Andel, Hacker and CEO at Zerocopter, says it’s wrong to judge and label all hackers as criminals, and …

Information Security Israel, entrepreneurship and cyber security: a recipe for success? 

Liron Barak, CEO and co-founder of BitDam, discusses why Israel’s cybersecurity sector has grown so rapidly and how the market …

Process IP theft – an old crime with a modern method 

How should we think about the theft of intellectual property? Tim Bandos, VP Cybersecurity, Digital Guardian, unravels a few truths …