Articles
Joanna Burkey, CISO at HP Inc, speaks to SC Media about the alarming rise in tensions between security teams and staff sparked by the pandemic – and offers practical steps for smoothing the road ahead
-
With a 17-year career in the police force, former investigator and all-round cyber action woman Fiona Paterson has form in whodunit cases. Now she’s focused on rooting out hackers in big business and the wider landscape – leading the world’s first cyber investigation accreditation programme for detectives, analysts, legal and IT staff
-
With the majority of us still working from home, your weakest link is your own people. With that in mind, we’ve looked back over the past 18 months to pick out SC Media UK’s top-five remote-working tips (and how to get your employees to listen).
-
Sarah Janes had a decade's worth of experience as a security awareness consultant at BT. She gave it up to start Layer 8, a company that specialises in security champions programmes. It was quite a move…
-
Three random words make better passwords than those with complicated upper- and lower-case characters, or those with special characters such as exclamation marks or asterisks, CISOs told.
-
The MoD recently announced the findings of its first Bug Bounty challenge – the program was a 30-day, hacker-powered security test aimed at finding flaws before the real hackers can exploit them
-
Nicola Whiting, co-owner of Titania Group, explains why developing a diverse workforce isn’t simply an ethical imperative, it’s a business – and security – essential. And there’s a diversity type that’s not so visible, is often overlooked but has a profound impact: neurodiversity
-
Because your people are your organisation’s least secure endpoint, Jason Stirland, CTO at DeltaNet International, offers an instant checklist into how effective your employee cybersecurity training really is…
-
Here, SC Media UK tells you three ways you can get your procurement department onside when it’s time for urgent investment...
-
The anti-virus trailblazer, who died recently, led an eventful life – as well as being at the forefront of our nascent sector… Here’s an instant run down
-
Bev Pryce has had a 20-year career in cybersecurity – mostly working in financial institutions – and is now a successful security consultant with expertise in Identity Lifecycle Management. She left school with poor GCSEs, has no A-levels and no degree. This is her story...
-
Big tech dominates the vendor market. It’s time to rethink how and why we’re stuck with them – and why we should look beyond the obvious…
The Secret CISO is a semi-regular column from a range of industry figures. If you’d like to be a Secret CISO for a week and have something the sector needs to hear, please email acting editor edward.craig@haymarket.com
-
In the second of a two-part special, consultant Paul Rummery explains how to navigate the current threat landscape…
-
Listen to the fourth episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the third episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the second episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
In the first of a two-part special, consultant Paul Rummery looks at the current threat landscape and how risk has changed due to increase in remote working.
-
Listen to the first episode in this podcast series with Adarma about how to minimise the impact of a breach, hosted by SC Media Associate Editor Kathryn Cave.
-
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence