Our most recent articles, videos and interviews relevant to anyone working within Information Security.

Information Security The 21st Century digital battle: how can we end fake news and who’s responsibility...

David Ingham, Digital Partner, Media & Entertainment, Cognizant discusses the ‘fake news’ phenomenon and, in an era dominated by internet …

Information Security Cyber security trends – what’s on the horizon?

Todd Kelly, CSO at Cradlepoint, discusses the main cyber security themes that have been shaping the IT landscape and look …

Information Security How to use a zero-trust model to strengthen security

John Stock, product manager, Outpost24, discusses how organisations can improve security by implementing zero-trust models.  In the recently released Verizon …

Technology Why fraud detection needs a reboot

Saryu Nayyar, CEO and founder, Gurucul, outlines what can be done to win the battle against fraudsters. Fraud occurs every day across …

People Want to improve your security? Understand the cognitive bias behind decision-making

People like to believe they’re perfectly rational beings. It can be a shock to learn that we’re not. It’s critical …

Information Security Chatham House: Who is going to be driving 6G?

Last week’s Cyber 2019, Chatham House, proved to be an excellent event, drawing together some of the most senior people …

Information SecurityNews Hackers hit mobile phone networks to snoop

Hackers have broken into the systems of more than a dozen global telecoms companies and taken large amounts of personal …

Process Don’t be a data hoarder

Matt Lock, Director of Sales Engineers at Varonis, explores why organisations are still struggling to lock down access to sensitive …

Information Security AMCA files for bankruptcy following massive breach that impacted 20m patients

The American Medical Collection Agency (AMCA) has filed for bankruptcy after being unable to bear the costs of a massive …

Information Security Five ways threat intelligence can supercharge security

Karen Levy, Senior Director Product and Client Marketing at Recorded Future, considers the 5 ways organisations can use threat intelligence …

Information Security 4 Essential Layers of ICS Security

Dean Ferrando, Lead Systems Engineer (EMEA) at Tripwire, offers four foundational principles of cyber security which may sound almost too …

Information Security What can we learn from the WhatsApp breach?

Paul Farrington, EMEA CTO, Veracode, discusses WhatsApp’s handling of its vulnerability disclosure and what this breach says about the way …