IAM The role of Identity Access Management during the COVID-19 pandemic

Identity and access management (IAM) systems work to securely manage digital identities and their access to various applications and systems. …

Hacking Baby monitors & smart cameras “easily” hacked by criminals

The Internet of Things (IoT) is advancing our daily lives, but also making users more vulnerable to privacy breaches. Baby …

IoT Why smart cities should be cyber security cities 

In this article, Galina Antova, co-founder and chief business development officer of Claroty ,talks about OT security in smart cities and …

IoT Recognising the need for greater regulation for the IoT

John Grimm, Senior Director of Strategy and Business Development, nCipher Security, says we need to take a proactive approach, creating …

IoT Should we view IoT with scepticism?

Although the IoT will provide innumerable benefits, Phil Beecher, President, Wi – SUN Alliance, questions the notion of collecting large …

Information security How to secure smart home devices

Hitesh Kargathra, lead security consultant at Falanx Group, shows us what it takes to increase the security of our smart …

IoT Is your IoT security ready for the new wave of threats?

One of the highlights of #teissLondon2018 was a presentation by Paul Hefferman, Group CISO for Unipart Group, in which he …

IoT Threats that smart cities pose: profiling and predictive policing

Tom Sorrell, Professor of Philosophy at the University of Essex, gives us two illuminating examples of how data generated in …

Risk management Why does a privilege account breach translate to ‘game over’ for a business?

There are dozens of breaches everyday in businesses across the UK. Some we hear about, some we don't. Some disclose …

Cloud security Unsecured cloud server exposed Viacom’s entire IT infrastructure!

Another web server misconfiguration, this time by Viacom, led to the exposure of the company's entire IT infrastructure as well …

Threat intelligence Building a threat sharing network can help prevent future attacks

The Equifax data breach led to hundreds of thousands of sensitive details of US citizens being laid bare. It also …

Cyber security Will blockchain be the saviour of cybersecurity?

Have you heard of Blockchain? Do you really understand what it means? I understood what it meant in theory but …