Data leak Private information exposed as over 2,000 UK Government technological devices stolen

Viasat a global communications company has found that more than 2000 technological devices e.g. smartphones, laptops and external storage devices …

Risk management Addressing “fatalism” in cyber security: Are we powerless to change events or do we...

Dr. Randy Burkhead, security consultant at AT&T Cybersecurity, discusses "fatalism" and the outdated approaches to cyber security that are holding …

Data protection What can we learn from the state of vulnerabilities in 2019?

Dima Bekerman and Sarit Yerushalmi, Security Research Managers at Imperva, reflect on the changes and trends in web application and database …

Cloud Migrating to the cloud? Essentials you need to know

Juan Perez-Etchegoyen, CTO at Onapsis, imparts his years of experience working with the cloud in order to provide a blueprint …

Business Continuity Business continuity strategy planning: Mistakes to avoid in 2020

Gary Criddle, Principal Cyber Risk and Resilience Consultant, Sungard AS, shares 6 business continuity strategy planning mistakes to avoid. Any …

Cyber security 5 steps to bolstering cyber security defences in the face an ever-growing threat

How to prevent data breach hell? Craig Hinkley, CEO of Whitehat Security, has the answers. A data breach of any …

Cyber skills How to write a winning CV for a job in cyber security

Moreno Carullo, co-founder and CTO, Nozomi Networks, discusses what budding cyber security professionals need to include in their CV to …

Fraud How to overcome the Magecart threat in 2020 and beyond

Simon Roe, product manager at Outpost24, outlines the dangers of Magecart over the coming years. The criminal group Magecart has …

Training Five tips to help companies develop and maintain a culture of security awareness

In this opinion piece, Gerald Beuchelt, CISO of LogMeIn, considers how companies can develop and maintain a culture of security …

IoT Why smart cities should be cyber security cities 

In this article, Galina Antova, co-founder and chief business development officer of Claroty ,talks about OT security in smart cities and …

Mobile security Jeff Bezos phone hack: Are we optimistically biased towards mobile devices?

Jeff Bezos's phone was hacked; what does this say about the relationships we have with our phones? Roy Akerman, VP, …

Hacking The cyber criminals selling network access to the highest bidder

Levi Gundert, SVP of Global Intelligence at Recorded Future , discusses the selling of pay-per-install services on the dark web, …