Our most recent articles, videos and interviews relevant to anyone working within Information Security.

Human factor How to stop bad habits getting in the way of security

We’re all creatures of habit. Often, this is to our advantage, as a good habit helps us remember to perform …

Risk management Corporate resistance – the unspoken IT security risk

Michael Scheffler, AVP EMEA at Bitglass, talks about why companies often lack the motivation to properly address IT security. He …

Resilience Be prepared, be proactive and practise, practise, practise!

Cyber security incident response plans require frequent workouts if they are to be fit for purpose. Businesses are more aware …

Ransomware What “Storm Area 51” taught us about ransomware

Alan Conboy, the office of the CTO, Scale Computing, responds to the news coverage around the attempted Area 51 raid. …

Women in technology Video interview with Yubico Founder, Stina Ehrensvärd

Authentication is at the heart of cyber security: it is crucial to securing a network. And yet, single-factor authentication is …

Mobile security Safe not sorry: Why SMBs must improve mobile security

Tom Davison, EMEA Technical Director at Lookout discusses the issues surrounding cyber threats of SMBs and some potential resolutions using …

GDPR Why is GDPR only now making the board pay attention to cyber security?

Dr Guy Bunker, CTO, Clearswift, shows us how the recent, high profile GDPR fines are the reason board members are …

Resilience Perception gaps in cyber resilience: What are your blind spots?

Sponsored by IBM
Explore the grey areas that impact IT security and cyber resilience.   Protecting IT systems and infrastructure against cyber threats …

IT security Five ways to improve security testing against advanced persistent threats

Known as a means to circumvent international sanctions, sophisticated state-sponsored cyber-attacks, or advanced persistent threats (APTs), recently made the headlines, …

Identity protection Identity and security: A perfect match

Barry McMahon, Senior International Marketing Manager at LogMeIn, explores the ongoing challenges that organisations are facing with identity access management. …

Information Security The step-by-step guide to a robust cyber-security strategy

Graham Marcroft, Operations and Compliance Director, Hyve, discusses the 6 steps for any business to achieve a bullet-proof cyber security …

Information Security Machine learning and the future of security

Is machine learning really revolutionising security? Morgan Jay, Area Vice President at Imperva, discusses why machine learning applications matter for …