Healthcare Rising US healthcare data breaches raise serious concerns about personal data security 

Anurag Kahol, CTO, Bitglass , outlines findings from the sixth annual Healthcare Breach Report (conducted by Bitglass). The vast majority of …

Cyber crime Recycled tools allow cybercriminals to attack like nation-states, and we need to change our...

Marcus Fowler, Director of Strategic Threat, Darktrace, discusses how hackers are recycling nation state tools to evolve their attack methods and …

Business Continuity How to ensure data and operations are recoverable after a cyber-attack

John Beattie, principal consultant at Sungard Availability Services outlines the critical steps organisations must take to ensure data and operations …

Cyber risk Zoom bombs make choosing video apps harder for lockdown chats

The coronavirus crisis has seen millions locked in their homes turn to videoconferencing apps, bringing with it question marks over …

Cloud 4 steps to stay in control of your cloud strategy

Nat Kausik, CEO, Bitglass outlines 4 steps organisations should take to stay in control of their cloud strategy.  In recent …

Business Continuity What cyber security can learn from our response to pandemics  

There are a few aspects of cyber security that businesses can learn from our response to the current pandemic, says …

Cyber security 7 tips to optimise security 

Javvad Malik, Security Awareness Advocate at KnowBe4, outlines 7 excellent steps on how we can optimise security today. verb (used …

Surveillance Coronavirus: location-tracking apps could stop the disease – here’s how

Nearly half of the world’s population is now locked down in their homes to avoid spreading the coronavirus. With a …

Hacking How to protect elections amid the coronavirus pandemic

At least seven states have postponed their presidential primaries in the face of the coronavirus pandemic. That has raised concerns …

Privacy ‘Zoombombers’ want to troll your online meetings. Here’s how to stop them

“Zoombombing” in case you haven’t heard, is the unsavoury practice of posting distressing comments, pictures or videos after gatecrashing virtual …

Business Continuity Entire companies working from home – how businesses can master the new challenges 

Ryan Weeks, CISO at Datto, provides guidance and best practices for CIOs to help ensure a seamless and secure migration …

Cloud How criminals are exploiting the cloud with multi-stage phishing attacks

Mattias Deny, VP Managed Security Services EMEA at Trustwave, outlines how attackers are using multi-stage phishing attacks targeting online cloud services. Just …