Articles
The anti-virus trailblazer, who died recently, led an eventful life – as well as being at the forefront of our nascent sector… Here’s an instant run down
-
Bev Pryce has had a 20-year career in cybersecurity – mostly working in financial institutions – and is now a successful security consultant with expertise in Identity Lifecycle Management. She left school with poor GCSEs, has no A-levels and no degree. This is her story...
-
Big tech dominates the vendor market. It’s time to rethink how and why we’re stuck with them – and why we should look beyond the obvious…
The Secret CISO is a semi-regular column from a range of industry figures. If you’d like to be a Secret CISO for a week and have something the sector needs to hear, please email acting editor edward.craig@haymarket.com
-
In the second of a two-part special, consultant Paul Rummery explains how to navigate the current threat landscape…
-
Listen to the fourth episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the third episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the second episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
In the first of a two-part special, consultant Paul Rummery looks at the current threat landscape and how risk has changed due to increase in remote working.
-
Listen to the first episode in this podcast series with Adarma about how to minimise the impact of a breach, hosted by SC Media Associate Editor Kathryn Cave.
-
The battles between network and security teams are legendary – and not improving. But, as Kathryn Cave explains, we’re family and, as we don’t get to choose family, we’ve got to find a way to muddle along constructively. Here’s some salient advice…
-
In part two of this ransomware special, Davey Winder talks to experts about ransomware payments: the mechanics, negotiation tactics, cryptocurrency transfers, ethics and business continuity... You need to pay attention!
-
Secure your place at the Akamai Security Summit EMEA all-digital event to hear from your peers and industry experts on the latest cybersecurity trends, tools and strategies for global cyber threat protection.
-
In part one of this ransomware special, Davey Winder talks to experts about the rise of criminal cooperation, how this has propelled ransomware to the top of the attack tree and analyses how organisations should respond…
-
What’s your mitigation strategy against a slow-burn, long-term threat? It’s an increasing headache. Here’s what you need to look out for…
-
A few simple steps from industry professionals could make a profound difference – this is not an option, it’s an imperative, says Dr Yulia Cherdantseva, a cyber skills lead at the Centre for Cyber Security Research at Cardiff University
-
A new report suggests criminalising the paying of ransom demands might change everything – but could it result in mutual assured destruction as cyber security goes nuclear? Organised crime researcher, lecturer and consultant Chris Allen takes a look
-
Hackers are primed to take advantage of providers’ lack of understanding of cloud security. Here’s an instant checklist on what to look out for…
-
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence