A wide range of articles, videos and interviews concerning persistent and current threats that organisations face.

Hacking Hackers have first-move advantage – that’s why defenders should learn like they do

Sponsored by Immersive_Labs
If threat actors didn’t innovate, we would have already won. It’s their ability to imagine new ways to hurt us, …

Ransomware Ransomware is back with a vengeance – how should enterprises respond?

Shawn Kanady, Director of Digital Forensics & Incident Response at SpiderLabs, Trustwave, draws on his first-hand experience of dealing with …

Fraud The Grinch bot that stole Christmas

Edward Roberts, Director of Product Marketing at Imperva, explores the strain that holiday bots are having on retailers and the …

Insider threat “Zombie” rules that lead people to expose their organisation to risk

Zombie rules are those well-intentioned yet obsolete protocols that continue to impede progress long after their owners have left the …

IoT Advancing Smart Factories: You’ve heard of the Cloud. Have you heard of Fog?

Lane Thames, senior security researcher, Tripwire, looks at the cyber security challenges faced by smart factories, and how fog computing …

Fraud ‘V’ for Vendor – the rise of vendor email compromise

Armen Najarian, Chief Identity Officer, Agari, discusses a dangerous new email attack strategy which uses a compromised company’s accounts to …

Fake news How can CISOs deal with deepfake scams?

Deepfake scams - yet another challenge for CISOs! So what to do? In this Security Leaders' Video Roundtable, filmed at …

Threat intelligence How you can use fake data to catch the real culprits

Patrick Martin, Senior Threat Intelligence Analyst at Skurio, explores how organisations can monitor for large volumes of data and know …

Insider threat Five ways to tackle the insider threat

Richard Agnew, VP EMEA, Code42 discusses the threat employees of all levels pose to business security and how to tackle it. …

Bug bounty Bug bounty programmes could have prevented costly data breaches in the UK

Four major data breach incidents that took place between 2015 and 2018 and inflicted losses of £265 million to the …

Insider threat A practical approach to combating insider threats

Shareth Ben, Insider Threat SME at Securonix, discusses insider threats. He also provides recommendations on how organisations can implement insider …

Ransomware What “Storm Area 51” taught us about ransomware

Alan Conboy, the office of the CTO, Scale Computing, responds to the news coverage around the attempted Area 51 raid. …