People Why the language of security needs to change

What's the problem with saying that, "People are the weakest link"? A lot, says Dr Jessica Barker, Chair, ClubCISO. Interviewed …

Podcast COVID-19: What are the cyber security threats to your organisation?

In light of the COVID-19 pandemic, on this week's teissPodcast we focus on the cyber security threats brought on by the …

Cyber skills DCMS report: Cyber security skills in the UK labour market 2020

The Cyber security skills in the UK labour market 2020 report highlights research into the UK cyber security labour market, …

Podcast Building a positive and modern culture of security with Michele Hanson, CISO at Micro...

Michele Hanson, CISO at software company Micro Focus, features on the teissPodcast this week. I met Michele at cyber security …

Podcast Cyber training: Is trying to change people’s behaviours useless?

What is behavioural economics, and how can it derail successful security training? That’s our topic this week on the teissPodcast …

Hacking The evolution of the hacker: how businesses can stay protected

In this article, Mike McGrath, Penetration Tester and IT Security Consultant at Bridewell Consulting, outlines how hacking has evolved and …

Education Should cyber security begin at school? And from what age?

How adequate is the public's cyber security awareness? How early in life should security education begin? Whose responsibility is it …

CISOs Security leaders break down the role of the CISO

How do you define the role of the CISO? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information …

Process “Zombie” rules that lead people to expose their organisation to risk

Zombie rules are those well-intentioned yet obsolete protocols that continue to impede progress long after their owners have left the …

Education Digital surveillance could be on the path to controlling everything, says cyber security academic

The academic year is well under way and students are settling in; but how protected are universities to the cyber …

Culture How to tackle the “blame culture” in cyber security

Are we too quick to point the finger and play the blame game after a breach? How is blame culture …

Communication 5 steps to communicating an impactful cyber security message

Vicki Gavin, Security, Privacy and Resilience - Advisor / Thought Leader, outlines her simple 5 step method to delivering a …