Breach Fast times call for change; so we have, too

Sponsored by F Secure
In recent years, remote working has become a regular treat for millions of employees, and a means to redress work …

Podcast How to manage the supply chain during COVID-19

Sponsored by ISF
When it comes to cyber security, the supply chain is never too far down on the agenda of potential security …

Podcast How should leadership respond during the COVID-19 crisis?

Sponsored by ISF
Without a doubt, the Covid-19 pandemic is affecting businesses - both small and large. So in these unsettling times, what …

Encryption The increasing importance of encryption

Sponsored by nCipher Security
A new study demonstrates the increasing importance businesses around the world attach to using encryption to protect information and data. …

Cyber security ISF cyber security resources to survive the COVID-19 pandemic

Sponsored by ISF
Our friends at the Information Security Forum (ISF) have compiled some useful resources to keep you and your businesses secure …

Data protection Five Tips to Secure Office 365

Sponsored by Varonis
If you’re moving to the Microsoft cloud, you’re not alone: Office 365 adoption continues to increase, with 180 million monthly …

Breach Think insider data breaches don’t happen at your organisation? Think again…

Sponsored by Egress
Insider data breaches are a bigger problem than many CISOs admit to – simply because it’s traditionally been difficult to …

Cloud security Assuming responsibility for data protection in the cloud

Sponsored by iStorage
Given the responsibility to ensure data protection in the cloud, how can organisations encrypt, share and manage data securely? Data …

Phishing Phishing attacks are on the rise – but is employee awareness following suit?

Sponsored by Proofpoint
Email remains the number-one threat vector used by cybercriminals. Threat actors continue to use email-based attacks to target people within …

Security awareness Gaining advantage over attackers: how VAPs figure into your security equation

Sponsored by Proofpoint
Over recent years the threat landscape has shifted away from infrastructure attacks aimed at servers, endpoints and networks as the …

Cyber security Zooming in on UEBA: answering the ‘what’ and the ‘how’

Sponsored by ManageEngine
What is UEBA? User and entity behaviour analytics (UEBA) is a relatively new category of cybersecurity tools that utilise machine …

GDPR GDPR and credential stuffing attacks: yes, they are reportable

Sponsored by Specops
Credential stuffing and password spraying attacks are reportable data breaches in compliance with GDPR. Any organisation based in the EU …