A wide range of articles, videos and interviews concerning persistent and current threats that organisations face.

Threat intelligence How you can use fake data to catch the real culprits

Patrick Martin, Senior Threat Intelligence Analyst at Skurio, explores how organisations can monitor for large volumes of data and know …

Insider threat Five ways to tackle the insider threat

Richard Agnew, VP EMEA, Code42 discusses the threat employees of all levels pose to business security and how to tackle it. …

Bug bounty Bug bounty programmes could have prevented costly data breaches in the UK

Four major data breach incidents that took place between 2015 and 2018 and inflicted losses of £265 million to the …

Insider threat A practical approach to combating insider threats

Shareth Ben, Insider Threat SME at Securonix, discusses insider threats. He also provides recommendations on how organisations can implement insider …

Ransomware What “Storm Area 51” taught us about ransomware

Alan Conboy, the office of the CTO, Scale Computing, responds to the news coverage around the attempted Area 51 raid. …

Hacking How to tackle cyber threats at the Rugby World Cup

As the 2019 Rugby World Cup approaches in Japan, David Warburton, F5 Networks Senior Threat Research Evangelist, considers the multiple …

IoT Smart home security: whose responsibility is it?

Consumers today probably don’t consider their homes to be “smart”. The reality, however, is that connected or internet of things …

Insider threat The Insider Threat: Would you report your boss?

Did you know employees are more likely to report their friends than other colleagues? A must read report on "The Insider …

Threat intelligence Five ways to improve security testing against advanced persistent threats

Sponsored by Cymulate
Known as a means to circumvent international sanctions, sophisticated state-sponsored cyber-attacks, or advanced persistent threats (APTs), recently made the headlines, …

Hacking How can we make a hacker’s job more difficult?

Eco & Biohacker, Kevin McPeake, reveals the key to making a hacker’s job more difficult. He also warns not to …

Machine Learning Machine learning and the future of security

Is machine learning really revolutionising security? Morgan Jay, Area Vice President at Imperva, discusses why machine learning applications matter for …

Hacking What do hackers drink?

Have you ever wondered what hackers drink? How do they stay awake at 3am, creating and cracking code, while the …