Articles
Sarah Janes had a decade's worth of experience as a security awareness consultant at BT. She gave it up to start Layer 8, a company that specialises in security champions programmes. It was quite a move…
-
Three random words make better passwords than those with complicated upper- and lower-case characters, or those with special characters such as exclamation marks or asterisks, CISOs told.
-
The MoD recently announced the findings of its first Bug Bounty challenge – the program was a 30-day, hacker-powered security test aimed at finding flaws before the real hackers can exploit them
-
Nicola Whiting, co-owner of Titania Group, explains why developing a diverse workforce isn’t simply an ethical imperative, it’s a business – and security – essential. And there’s a diversity type that’s not so visible, is often overlooked but has a profound impact: neurodiversity
-
Because your people are your organisation’s least secure endpoint, Jason Stirland, CTO at DeltaNet International, offers an instant checklist into how effective your employee cybersecurity training really is…
-
Here, SC Media UK tells you three ways you can get your procurement department onside when it’s time for urgent investment...
-
The anti-virus trailblazer, who died recently, led an eventful life – as well as being at the forefront of our nascent sector… Here’s an instant run down
-
Bev Pryce has had a 20-year career in cybersecurity – mostly working in financial institutions – and is now a successful security consultant with expertise in Identity Lifecycle Management. She left school with poor GCSEs, has no A-levels and no degree. This is her story...
-
Big tech dominates the vendor market. It’s time to rethink how and why we’re stuck with them – and why we should look beyond the obvious…
The Secret CISO is a semi-regular column from a range of industry figures. If you’d like to be a Secret CISO for a week and have something the sector needs to hear, please email acting editor edward.craig@haymarket.com
-
In the second of a two-part special, consultant Paul Rummery explains how to navigate the current threat landscape…
-
Listen to the fourth episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the third episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the second episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
In the first of a two-part special, consultant Paul Rummery looks at the current threat landscape and how risk has changed due to increase in remote working.
-
Listen to the first episode in this podcast series with Adarma about how to minimise the impact of a breach, hosted by SC Media Associate Editor Kathryn Cave.
-
The battles between network and security teams are legendary – and not improving. But, as Kathryn Cave explains, we’re family and, as we don’t get to choose family, we’ve got to find a way to muddle along constructively. Here’s some salient advice…
-
In part two of this ransomware special, Davey Winder talks to experts about ransomware payments: the mechanics, negotiation tactics, cryptocurrency transfers, ethics and business continuity... You need to pay attention!
-
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence