Our most recent articles, videos and interviews relevant to anyone working within Information Security.

IT security Security metrics – which work and which don’t!

When used effectively metrics can help identify strengths and weaknesses in controls and processes in an organisation’s cyber security program …

Artificial Intelligence Watch out, AI cybercrime is coming!

Scared about the dangers of AI? Or is it all the stuff of Science Fiction? Terry Ray, Senior Vice President …

Human factor How can gossip impact a data breach?

Dr Sandra Bell, Head of Resilience Consulting, Sungard Availability Services, explains how dysfunctional behaviour during response and recovery can be …

IT security Introducing Secure by Design Frameworks to OT Environments

Moreno Carullo, co-founder and Chief Technical Officer at Nozomi Networks, discusses introducing a secure by design framework to OT environments. …

Data protection Data management: the art of deletion

Jasmit Sagoo, Senior Director, Head of Technology UK & Ireland at Veritas Technologies, discusses the role of the data protection …

Human factor How to stop bad habits getting in the way of security

We’re all creatures of habit. Often, this is to our advantage, as a good habit helps us remember to perform …

Risk management Corporate resistance – the unspoken IT security risk

Michael Scheffler, AVP EMEA at Bitglass, talks about why companies often lack the motivation to properly address IT security. He …

Resilience Be prepared, be proactive and practise, practise, practise!

Cyber security incident response plans require frequent workouts if they are to be fit for purpose. Businesses are more aware …

Ransomware What “Storm Area 51” taught us about ransomware

Alan Conboy, the office of the CTO, Scale Computing, responds to the news coverage around the attempted Area 51 raid. …

Women in technology Video interview with Yubico Founder, Stina Ehrensvärd

Authentication is at the heart of cyber security: it is crucial to securing a network. And yet, single-factor authentication is …

Mobile security Safe not sorry: Why SMBs must improve mobile security

Tom Davison, EMEA Technical Director at Lookout discusses the issues surrounding cyber threats of SMBs and some potential resolutions using …

GDPR Why is GDPR only now making the board pay attention to cyber security?

Dr Guy Bunker, CTO, Clearswift, shows us how the recent, high profile GDPR fines are the reason board members are …