Top Tips to Keep the Hackers at Bay
What was once a couple of physical doors that kept your office safe is now a multitude of virtual doors that you can’t control
There's No David vs Goliath in Cybersecurity Innovation
Cybersecurity needs new and radical approaches, as well as rethinking and re-engineering. This is tough for established organizations to take on board and put into practice, but it’s exactly what start-ups do best
As Hackers Target US Election, Onus is on Security Pros to Protect Data
The possibility of hackers using malicious, electronic means to interfere with the election process marks a game changer for information security professionals
In Cybersecurity Hiring, Aptitude Trumps Experience and Skills
As a hiring manager, you may be presented with a choice: hire the candidate with the most experience or a natural ability to get things done. While tenure is the indicator of expertise in many careers, the case can be made for hiring based on aptitude versus experience in cybersecurity
#BHUSA Dropped USB Experiment Detailed
Earlier this year, a whitepaper was released which revealed the results of an experiment where malicious USB sticks were dropped around the campus of the University of Illinois.
A Day in the Life of an IT Pro: Hacked off with IoT
I know the topic of connected fridges and the like is often covered, but amid the cacophony of excited consumers is a warning – the impact of IoT on enterprise security could be monumental.
SentinelOne Financially Guarantees Ransomware Recovery
Endpoint security vendor SentinelOne has announced a cyber-threat “protection guarantee” that will provide customers with financial protection in the event of ransomware attacks on their networks
Why IT Service Desk Should be your First Line of Defence
In a world of zero day vulnerabilities and advanced persistent threats, it is the Service Desk, coupled with a layered approach of patch management and application control, which must provide a vital first line of defense against industrial hackers.
Ransomware Holds Your Data Hostage. Here’s How to Stop It
Finding yourself in a situation where your data is held hostage can be an intensely frustrating experience for individuals and businesses.
Steelcon - When Hackers Went North
Describing itself as a hacker con “with a northern edge”, the conference welcomed some leading lights from the UK information security scene and after seeing its growth and an impressive 2015 from afar, I was able to grab a ticket and get along to it
Will Linking Executive Pay to Cybersecurity be the Wake-Up Call CEOs Need?
CEOs who don’t work in the telecoms or IT sectors may not have paid much attention to the Culture, Media and Sport Committee’s investigation into cybersecurity, which was triggered by last October’s cyber-attack on TalkTalk. That might be a mistake.
Banking on Security
The financial services industry is evolving at a rapid rate. From shifting customer expectations to disruptive technology, it has had to redefine itself and now leads by shining example as a sector that is an expert at digital.