If AI absorbs the tasks that have been traditionally training new cyber-security professionals, how do we develop the next generation of expert talent?
As regulations such as NIS2 and DORA tighten and cyber-attacks grow more sophisticated, mid-sized UK organisations face enterprise-level expectations without enterprise-level resources
On the 30 year anniversary of the World Wide Web, we ask Head of Cyber Security at ITC, Malcolm Taylor whether he thinks it's been a force for good or bad...We also explore the nature of privacy and trust and how they’ve changed during that time and are changing still.|On the 30 year anniversary of the World Wide Web, we ask Head of Cyber Security at ITC, Malcolm Taylor whether he thinks it's been a force for good or bad...We also explore the nature of privacy and trust and how they’ve changed
Privacy by design and how to do it well, Hadi Hosn, Director of Cyber Security Solutions EMEA at SecureWorks, sets out strategies for integrating privacy by design into processes and applications.
As cyber-security and AI threats escalate, organisations need a single leader to bring security, privacy, compliance and communications together to build trust