Our most recent articles, videos and interviews relevant to anyone working within Information Security.

Ransomware What “Storm Area 51” taught us about ransomware

Alan Conboy, the office of the CTO, Scale Computing, responds to the news coverage around the attempted Area 51 raid. …

Women in technology Video interview with Yubico Founder, Stina Ehrensvärd

Authentication is at the heart of cyber security: it is crucial to securing a network. And yet, single-factor authentication is …

Mobile security Safe not sorry: Why SMBs must improve mobile security

Tom Davison, EMEA Technical Director at Lookout discusses the issues surrounding cyber threats of SMBs and some potential resolutions using …

GDPR Why is GDPR only now making the board pay attention to cyber security?

Dr Guy Bunker, CTO, Clearswift, shows us how the recent, high profile GDPR fines are the reason board members are …

Resilience Perception gaps in cyber resilience: What are your blind spots?

Sponsored by IBM
Explore the grey areas that impact IT security and cyber resilience.   Protecting IT systems and infrastructure against cyber threats …

IT security Five ways to improve security testing against advanced persistent threats

Known as a means to circumvent international sanctions, sophisticated state-sponsored cyber-attacks, or advanced persistent threats (APTs), recently made the headlines, …

Identity protection Identity and security: A perfect match

Barry McMahon, Senior International Marketing Manager at LogMeIn, explores the ongoing challenges that organisations are facing with identity access management. …

Information Security The step-by-step guide to a robust cyber-security strategy

Graham Marcroft, Operations and Compliance Director, Hyve, discusses the 6 steps for any business to achieve a bullet-proof cyber security …

Information Security Machine learning and the future of security

Is machine learning really revolutionising security? Morgan Jay, Area Vice President at Imperva, discusses why machine learning applications matter for …

Information Security How to tackle security in the cloud era

Anurag Kahol, CTO at Bitglass, discusses best practice to help organisations reap all the benefits of the cloud without succumbing …

People A guide to helping people overcome “cyber attack fatigue”

The more that we warn people about threats that don’t manifest in their personal lives, the more likely people become …

Information Security Deploying edge computing architecture? Read this before you jump

Andrew Bargery, Solutions Architect, F5 Networks, discusses what businesses need to think about before jumping into deploying edge computing architecture. …