Vulnerability Vulnerability Management Mountain: The View from the Summit

If you haven’t read the previous article in this series on vulnerability management (VM), catch up on the series with …

Risk management Security in a time of pandemic – how to remediate the top security threats...

Recently, the FBI and US Department of Homeland Security published their report on the most damaging issues around cyber security …

Third party risk The extended enterprise ecosystem: A growing threat

The benefits of a diverse, interconnected supply chain are compelling. Agility, speed, and cost reduction all weigh on the positive …

Cyber security Identity as an enabler: How can security teams shift their reputation?

For many, digital transformation has been little more than a buzzword that is thrown around, never really materialising into change …

Training Homeworkers wait for protection: 73% of employees have not received remote working cybersecurity guidance

According to a recent Kaspersky report, How COVID-19 changed the way people work, three-in-four (73%) employees working from home have …

Podcast COVID-19: What are the cyber security threats to your organisation?

In light of the COVID-19 pandemic, on this week's teissPodcast we focus on the cyber security threats brought on by the …

Cyber risk Quantifying cyber risk: When perceived risk outweighs reality

Bob Huber, Chief Security Officer, Tenable, addresses the impact of the media-fuelled hype that surrounds vulnerabilities on enterprise security efforts …

Behaviour Jessica Barker, ClubCISO, shows us why fear is not the answer in security awareness

Employees dealing with cyber security risk will be familiar with the fear factor. At teissLondon2020, Jessica Barker, Chair of ClubCISO, …

5G Pompeo urges EU to exclude ‘high-risk suppliers’ from 5G networks

U.S. Secretary of State Mike Pompeo on Thursday urged the European Union to exclude "high-risk" suppliers from all parts of …

Insider threat “Zombie” rules that lead people to expose their organisation to risk

Zombie rules are those well-intentioned yet obsolete protocols that continue to impede progress long after their owners have left the …

5G Huawei seeks to reduce EU concerns with 5G partnership proposal

Chinese telecoms manufacturer Huawei Technologies sought on Wednesday to ease European concerns that it is a cyber security risk. They …

Board level Cyber security: just part of the wider digital governance agenda

Cyber security is a strategic issue that goes to the heart of whether an organisation will prosper in today’s complex …