A wide range of articles, videos and interviews concerning persistent and current threats that organisations face.

Encryption Specops’ Bitlocker key recovery

Sponsored by Specops
The problem When an employee loses their laptop, the possibility of someone accessing their data by booting it up from …

Threat intelligence Destress your security staff with an advanced SOC

Sponsored by Cyberseer
The issue Many factors affect the ability of an organisation to remain secure, including an exponential increase in log data …

Malware Why NotPetya was a really good piece of malware

What made NotPetya a really good piece of malware? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information …

Cyber crime Doorbuster or doppelgӓnger: How to detect attacks that deceive via discount 

Justin Fier, Director of Cyber Intelligence & Analytics discusses why the frenzy of passwords, money and credit card information changing …

Fake news Is fake news a cyber security challenge?

Is fake news a cyber security issue? Should cyber security professionals be held responsible for stopping the spread of misinformation? …

Hacking Hackers have first-move advantage – that’s why defenders should learn like they do

Sponsored by Immersive_Labs
If threat actors didn’t innovate, we would have already won. It’s their ability to imagine new ways to hurt us, …

Ransomware Ransomware is back with a vengeance – how should enterprises respond?

Shawn Kanady, Director of Digital Forensics & Incident Response at SpiderLabs, Trustwave, draws on his first-hand experience of dealing with …

Fraud The Grinch bot that stole Christmas

Edward Roberts, Director of Product Marketing at Imperva, explores the strain that holiday bots are having on retailers and the …

Insider threat “Zombie” rules that lead people to expose their organisation to risk

Zombie rules are those well-intentioned yet obsolete protocols that continue to impede progress long after their owners have left the …

IoT Advancing Smart Factories: You’ve heard of the Cloud. Have you heard of Fog?

Lane Thames, senior security researcher, Tripwire, looks at the cyber security challenges faced by smart factories, and how fog computing …

Fraud ‘V’ for Vendor – the rise of vendor email compromise

Armen Najarian, Chief Identity Officer, Agari, discusses a dangerous new email attack strategy which uses a compromised company’s accounts to …

Fake news How can CISOs deal with deepfake scams?

Deepfake scams - yet another challenge for CISOs! So what to do? In this Security Leaders' Video Roundtable, filmed at …