Information Security A practical guide to busting the “perfect security” myth

There’s no such thing as “perfect security” just like there’s no such thing as a “real” unicorn. Most people have …

Podcast Security training: should we give humans a break?

Cryptographer Bruce Schneier once said, "only amateurs attack machines, professionals target people" and yet how far should we be blaming …

Human error What can Snoopy teach us about security?

Good security depends on people responding properly to a wide range of cyber threats. To train people effectively, you first …

Behaviour How to change behaviour in the workplace? Fear is not the answer

Head of Information Security at Bank of Ireland UK, Flavius Plesu, says that the key to improving security is to …

Resilience How can your business be cyber resilient?

Paul Watts, CISO at Domino’s Pizza Group PLC, talks about what makes a business cyber resilient. In this interview filmed at …

Passwords Not again! Password behaviour continues to remains a major concern for IT executives

A majority of IT executives across the UK continue to rely on employees to monitor their password behaviour, reveals a …

News The top 10 most-clicked phishing email subject lines globally

Hackers are increasingly using phishing emails with click-bait subject lines to bypass corporate filters and gain access to corporate networks. …