Our most recent articles, videos and interviews relevant to anyone working within Information Security.

Supply chain How to deal with the complexity of supply chains

How can we deal with the complexity of supply chains? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of …

Cloud security 2020 cybersecurity trends and resolutions

Ray Pompon, Principal Threat Research Evangelist, F5 Labs, shares insight on 2020 cyber security trends and resolutions From tech giants …

Fake news Is fake news a cyber security challenge?

Is fake news a cyber security issue? Should cyber security professionals be held responsible for stopping the spread of misinformation? …

Ransomware Ransomware is back with a vengeance – how should enterprises respond?

Shawn Kanady, Director of Digital Forensics & Incident Response at SpiderLabs, Trustwave, draws on his first-hand experience of dealing with …

Data protection GDPR vs CCPA: Two legislations, different requirements

W. Curtis Preston, Chief Technical Evangelist, Druva, discusses America’s version of GDPR, the California Consumer Protection Act (CCPA), and what this …

Fraud The Grinch bot that stole Christmas

Edward Roberts, Director of Product Marketing at Imperva, explores the strain that holiday bots are having on retailers and the …

Passwords Why your password doesn’t pass the test

Sponsored by Specops
Contrary to popular belief, hackers don’t need sophisticated tools or special skills to break into a network. According to this …

Data protection Is it time for organisations’ cyber security credentials to take centre stage online?

Anurag Kahol, CTO, Bitglass, examines where companies are lacking in their security and will provide best practice tips on how …

Process “Zombie” rules that lead people to expose their organisation to risk

Zombie rules are those well-intentioned yet obsolete protocols that continue to impede progress long after their owners have left the …

Cloud Keeping safe in the cloud

Cyber-criminals are moving to the cloud just as rapidly as the rest of us – make sure you are protecting …

Cloud security How to best secure cloud-based applications and infrastructure

Katie Curtin-Mestre, VP of Product, CyberArk, shares advice on the best practices for securing cloud-based applications and infrastructure. Public cloud …

Cyber risk How are airports innovating against cyber-attacks, security breaches and failing tech systems?

How are airlines innovating against cyber-attacks, security breaches and failing tech systems? Orion Cassetto, director product marketing, Exabeam, explores. Customer …