Our most recent articles, videos and interviews relevant to anyone working within Information Security.

Risk management Addressing “fatalism” in cyber security: Are we powerless to change events or do we...

Dr. Randy Burkhead, security consultant at AT&T Cybersecurity, discusses "fatalism" and the outdated approaches to cyber security that are holding …

Vulnerability What can we learn from the state of vulnerabilities in 2019?

Dima Bekerman and Sarit Yerushalmi, Security Research Managers at Imperva, reflect on the changes and trends in web application and database …

Cloud security Migrating to the cloud? Essentials you need to know

Juan Perez-Etchegoyen, CTO at Onapsis, imparts his years of experience working with the cloud in order to provide a blueprint …

Resilience Business continuity strategy planning: Mistakes to avoid in 2020

Gary Criddle, Principal Cyber Risk and Resilience Consultant, Sungard AS, shares 6 business continuity strategy planning mistakes to avoid. Any …

Recruitment Recruiting cyber talent: The candidate you really should have on your team

If you’re not prepared to answer difficult questions about your organisation’s recent challenges, then you probably shouldn’t be interviewing new …

Cloud security Assuming responsibility for data protection in the cloud

Sponsored by iStorage
Given the responsibility to ensure data protection in the cloud, how can organisations encrypt, share and manage data securely? Data …

IT security 5 steps to bolstering cyber security defences in the face an ever-growing threat

How to prevent data breach hell? Craig Hinkley, CEO of Whitehat Security, has the answers. A data breach of any …

Career How to write a winning CV for a job in cyber security

Moreno Carullo, co-founder and CTO, Nozomi Networks, discusses what budding cyber security professionals need to include in their CV to …

GDPR GDPR and credential stuffing attacks: yes, they are reportable

Sponsored by Specops
Credential stuffing and password spraying attacks are reportable data breaches in compliance with GDPR. Any organisation based in the EU …

Hacking Ex-Anonymous hacker, Jake Davis, speaks to teiss at the International Cybersecurity Forum

Humans were at the very heart of reflections at the International Cybersecurity Forum (FIC 2020) - a three day event, …

Infrastructure Why smart cities should be cyber security cities 

In this article, Galina Antova, co-founder and chief business development officer of Claroty ,talks about OT security in smart cities and …

Cyber skills What cyber skills gap?

There's a cyber security skills gap...or is there? What's the real issue here? Watch this Security Leaders' Roundtable where Nic …