Our most recent articles, videos and interviews relevant to anyone working within Information Security.

Data security Entire companies working from home – how businesses can master the new challenges 

Ryan Weeks, CISO at Datto, provides guidance and best practices for CIOs to help ensure a seamless and secure migration …

ICO ICO’s Director of Investigations shares his predictions for 2020

It's not always easy to predict what's going to happen over the coming year! However, when it comes to what …

Cyber risk Steps to maintain business continuity during the corona pandemic

Tim Mackey, principal security strategist at the Synopsys CyRC (Cybersecurity Research Center), says it's essential to identify areas of IT weakness before …

People Dr Jessica Barker on why the language of security needs to change

What's the problem with saying that, "People are the weakest link"? A lot, says Dr Jessica Barker, Chair, ClubCISO. Interviewed …

Bitcoin While coronavirus rages, bitcoin has made a leap towards the mainstream

Anyone holding bitcoin would have watched the market with alarm in recent weeks. The virtual currency, whose price other cryptocurrencies …

Insider threat How to achieve visibility and control over data access in your organisation

Ben Bulpett, EMEA Director, SailPoint, explores how organisations can safeguard against the insider threat. Today, a job is no longer for life. …

Data security Staying secure through COVID-19: Be vigilant and trust your people

COVID-19 is having a dramatic impact on all of our lives. The fraudsters are getting creative and many of us …

Breach Nearly half of businesses suffered a cyber breach over the past year

The newly published Cyber Security Breaches Survey 2020 aims to help UK businesses and charities understand the nature and significance …

Cyber risk Quantifying cyber risk: When perceived risk outweighs reality

Bob Huber, Chief Security Officer, Tenable, addresses the impact of the media-fuelled hype that surrounds vulnerabilities on enterprise security efforts …

Privilege Management Why the public sector needs a fresh lick of cyber security paint

John Hurst, Public Sector Sales Director, CyberArk, highlights the public sector’s dire need to gear up its cyber security management. Almost …

Data privacy Isn’t facial recognition technology just like CCTV?

Stephanie Hare, Author of Technology Ethics, debunks some myths around facial recognition. Watch this video filmed at teissLondon2020 where she …

Mobile security Is Huawei really a threat to the UK’s 5G plans?

Jeremy Swinfen Green, teiss Editor-in-Chief, explains why the UK Government was right to push back on politicians who wanted to …