Remote working Identity in the empty office: what’s next for the hybrid workforce?

The business challenges created by COVID-19 are extreme. Organisations have had to rapidly shift to remote working models, placing huge …

Security awareness Back to basics: Improving your security processes and budgeting

In the rush to improve our security, we can easily conflate “new” with “better.” This ‘cargo cult’ mentality involves building …

Phishing Counting the cost of cyber-attacks in the pandemic era

As the threat posed to our health posed by COVID-19 increased, so did the number of cyber-attacks targeting notable organisations …

Quantum computing How to prepare your organisation for the quantum computing era

Within the next few years a quantum computer will crack encryption. This once in a generation event will, in a …

Remote working Encryption and endpoint control: the heroes of post-lockdown data security

The world may have slowed down somewhat in recent months, but cyber-attackers haven’t paused for a second. Some big names …

Remote working Trust and remote working: The new frontier for security professionals

It is impossible to avoid the seismic shift in working culture which Covid19 has ushered in. The explosion of remote …

Data protection Is your data as safe as you think it is?

Today’s data protection market is more complex than many of us would at first believe. The reason is closely tied …

Third party risk Modernising third-party cyber risk management: whose risk agenda are you trying to satisfy?

Managing third-party cyber security risk in today’s highly connected businesses isn’t easy. Security and risk management teams are pulled in …

Leadership How to foster a culture of security in uncertain times

With the pandemic, the switch to remote working on a much larger scale than companies were used to has accelerated …

Threat intelligence Orchestration with and without intelligence: What’s the difference?

How best to use orchestration and automation in cyber security operations is a question that many CISOs have been asking …

Data privacy Three steps for navigating privacy and cyber incident notification and disclosure requirements

Data breach and cyber security incident notification and disclosure requirements vary by industry and jurisdiction, and extend well beyond privacy-related …

IAM Knock knock, who’s there? Closing the door on hackers with identity

Imagine granting someone access to your front door, without giving them any rules for visiting – like whether they must …