It’s been a month since the Chartered Institute of Information Security (CIISec) released its damning research into the state of gender equality and balance in cybersecurity.  How did the sector react to the findings? What, if anything, has actually happened as a result – and one month later, what exactly have we learned?

One weekly email. One important story. Sign up to the Newswire and stay ahead on insight, intelligence and what the industry's thinking…

More articles here >>>

Webinars

Our Webinars are truly informative, so that you will come away knowing more about the topic than you did before, and ideally with actionable information that you can apply in your organisation. Editorially independent moderators will quiz expert presenters and panellists, as well as asking questions from listeners to tease out the answers that you need to improve your performance. Listen today, engage with the experts, ask a question, and improve your understanding of the issues that matter to you.

Watch

How does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.

In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations. 

  • image
    Meera Rao Senior Director of Product Management, Synopsys
  • image
    Adam Brown Managing Consultant , Synopsys
  • image
    Dan Raywood Information Security journalist, (Host)
Watch

The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too? 

  • image
    Ben Langrill Director of Product Integrations, RangeForce
  • image
    William Munroe VP of Marketing, RangeForce
  • image
    Rene Millman Freelance writer (host)
Watch

This is a question that many security teams are asking, as the shift to remote working has rapidly accelerated the adoption of cloud-based productivity tools. Join this session for practical, applicable advice on steps every organisation should be taking to securely navigate the new security landscape.

  • image
    Max Linscott Senior Product Marketing Manager, Mimecast
  • image
    Tom Reeve Technology editor & writer

Expert reports

When you need a background briefing on a topic, or a more in-depth update on a particular issue that is causing you a problem, there is sure to be an SC Whitepaper to meet your needs. SC Whitepapers extend from wide-ranging overviews to in-depth analysis of specific issues of interest to cyber-security professionals. Our Whitepapers are written by authoritative acknowledged experts in their fields and range from Access to Zero days, with insider threats, ransomware, DDoS, breaches, planning, remediation, behavioural analysis, regulation (including GDPR) and updates on specific threats among topics covered. We work in cooperation with selected commercial partners, ensuring that the information provided is independent, unbiased and authoritative.

You need to be a big organisation to protect against every threat in-house these days. And even if you’re a big firm, you need the right people in place and access to the right advice – as well as flexible, agile cyber security infrastructure. In this Sophos’ MDR Buyers’ Guide, it'll navigates you through the choppy waters of first deciding to out-source security operations, part or whole – then actually doing it.