Leadership How to foster a culture of security in uncertain times

With the pandemic, the switch to remote working on a much larger scale than companies were used to has accelerated …

Threat intelligence Orchestration with and without intelligence: What’s the difference?

How best to use orchestration and automation in cyber security operations is a question that many CISOs have been asking …

Data privacy Three steps for navigating privacy and cyber incident notification and disclosure requirements

Data breach and cyber security incident notification and disclosure requirements vary by industry and jurisdiction, and extend well beyond privacy-related …

IAM Knock knock, who’s there? Closing the door on hackers with identity

Imagine granting someone access to your front door, without giving them any rules for visiting – like whether they must …

Cloud security With their head in the cloud, organisations must keep their foothold on security

The coronavirus pandemic has not only fundamentally shifted the way we interact, but also highlighted the power of human connection. …

Artificial Intelligence Over 30 years after the ‘first’ attack, the cyber threat landscape reaches the next...

The world’s’ first cyber-attack’ hit the headlines in 1988. It was the Morris Worm – a personal project of the …

IAM How can businesses secure the remote workforce?

The security awareness of workers is fundamental when it comes to driving cyber secure practices at work. The impact of …

Remote working Four key cyber security lessons from COVID: Adjusting to the new normal

The last few months have brought drastic and long-lasting changes to the business world. Indeed, for a great many people …

Artificial Intelligence Automating the fight against large scale cyber-threats during and post-pandemic

The Covid-19 pandemic continues to be an immense humanitarian crisis that is severely impacting the global economy. As organisations have …

Cloud security Evolving fears stilt the growth of cloud adoption

Fears over data loss and compliance breaches have held back UK organisations from cloud adoption according to the latest research …

Data privacy When data manipulates you

Breaches and data leaks occur with disappointing frequency, whereby millions of records fall into the wrong hands or are misused. This …

Cyber risk Adding a new layer of security to the global internet

As internet traffic continues to surge, Adam Davenport, director of interconnection strategy at GTT, explores the steps that must be …