Our most recent articles, videos and interviews relevant to anyone working within Information Security.

People Why we all need to hug a hacker

Edwin van Andel, Hacker and CEO at Zerocopter, says it’s wrong to judge and label all hackers as criminals, and …

Information Security Israel, entrepreneurship and cyber security: a recipe for success? 

Liron Barak, CEO and co-founder of BitDam, discusses why Israel’s cybersecurity sector has grown so rapidly and how the market …

Process IP theft – an old crime with a modern method 

How should we think about the theft of intellectual property? Tim Bandos, VP Cybersecurity, Digital Guardian, unravels a few truths …

Breach What do you do after a data breach?

Security experts say data breaches will continue to happen as cyber criminals and state-backed hackers target the protected information held …

People Cyber-attacks: how are they damaging business leaders’ mental health?

Sponsored by SungardAS
Chris Huggett at Sungard Availability Services discusses new research that uncovers the extent to which UK business leaders are experiencing …

Technology Is emerging tech outpacing cyber security?

Dr Guy Bunker, CTO at Clearswift,says that businesses need to be made aware of the dangers of adopting emerging tech which …

Information Security How to launch a successful bug bounty program

Laurie Mercer, security engineer at HackerOne, reveals what it takes to launch a successful bug bounty program. Nobody wants to …

People Five key trends affecting Security Operations Centres in 2019

Steve Moore, Chief Security Strategist at Exabeam, takes a look at some of the key trends revealed in Exabeam’s 2019 …

People Why “old” skills still have practical value for cyber security

It’s easy to feel overwhelmed by the madcap pace of change in technology. Sometimes it might feel like all our …

Technology What is EDR and is it failing?

Migo Kedem, Senior Director, Products and Marketing at SentinelOne, talks about what EDR is, what problems it was created to …

Process How clever data management protects you from ransomware

Jasmit Sagoo, senior director, Head of Technology UK&I, Veritas, explains how to best prepare for a ransomware attack with 5 key …

Information Security Recognising the need for greater regulation for the IoT

John Grimm, Senior Director of Strategy and Business Development, nCipher Security, says we need to take a proactive approach, creating …