Information security What the InfoSec C-Suite needs to know about Document Management Systems

Aaron Rangel, Director of Product Management, iManage, outlines the types of attacks that DMS systems are susceptible to, as well …

Information security What does an effective strategy for encryption entail?

Simon Keates, Business Development Director, EMEA at Thales eSecurity, highlights what the best approach for an effective encryption strategy is …

Threats 84% of FTSE 350 boards lack understanding of impact of cyber threats, finds govt

The government's FTSE 350 Cyber Governance Health Check Report for 2018 has found that an overwhelming 84% of company boards …

Information security Bond, bridges and bravery at Cyber Security Connect UK

Lamborghinis, roulette, fine wine and a sea view. Not the usual setting for a cyber security conference. But such was …

Board level Cyber security: why your board won’t listen

Martin Leggett, Head of Strategy and Behavioural Change at The Security Company, explains how security professionals can engage top management …

Board level How “embarrassment” can improve your cyber security, from the top down!

Don’t let a little personal embarrassment get in the way of leading by example. Your people are always watching to …

Board levelNews Book extract: Why top management must address cyber security

Directors and top management have a key role in ensuring that cyber security is addressed as a strategic issue by …

Board levelNews What are the key cyber security issues to consider in the boardroom?

What are the key cyber security issues executives must consider in the boardroom? TEISS guest blogger Martin Ewings, Director of …

News Majority of UK CEOs viewing cyber security investment as a revenue opportunity

UK CEOs are increasingly viewing investment on cyber security as an opportunity to garner more revenue instead of as an …

Information security FTSE 100 failing the cyber test

They are large organisations and all of them face considerable challenges in keeping their data and IT systems secure. Yet …