Articles
How vulnerabilities are discovered, disclosed and dispatched makes a significant difference to risk management. And new research says we’re getting it wrong. Mark Mayne investigates…
-
Increasing the variety of minds and people in our sector is not simply a nice-to-have: it’s an operational imperative. Owanate Bestman is a cybersecurity specialist recruiter with first-hand experience of creating gender-balanced security departments. Here’s how he does it…
-
In the second of a two-part series looking into how cybercriminals operate organised crime consultant, lecturer and researcher Chris Allen looks at how the dark markets actually work and whether you can mitigate…
-
In the first of a two-part series looking into how cybercriminals operate, organised crime consultant, lecturer and researcher Chris Allen looks at how and why people become cybercriminals and what we can do to stop them…
-
The process of signing and signatures has always been susceptible to fraud but as technology has progressed, the act of signing has become far more secure than in the past, to the point where wet signatures can be considered more risky compared to digital signatures, especially in the context of remote business.
In this long-read article, in association with Entrust, we look at why digital signatures are so paramount for security, and the connection it has with PKI.
-
Should your organisation adopt an Avengers-style strategy to security to stand the best chance of countering emerging cyber threats? Davey Winder has been speaking to industry experts who think that psychologists, spooks, and scientists hold the key to locking down your cybersecurity defences.
-
There’s one defence against the criminals that needs a firmer push. Nina Paine, global head, cyber stakeholder and government engagement at Standard Chartered, explains how she’s behind a drive for creating a diversity of perspectives in cybersecurity – and why you should be too…
-
We’re all used to gloom and doom, political upheaval, pandemic woes, economic cliff-edges and all sorts of macro risks that, sometimes, we forget to look at the stuff that’s going right. To brighten this January, here’s one such example: hackers are failing to keep up with the pace of new vulnerabilities found in software and hardware.
-
Chris Allen, organised crime researcher, lecturer and consultant, picks five must-reads for any cybersecurity professional
-
Sensors reported a staggering 199.7 million ransomware attacks globally in the third quarter of 2020, as organisations worldwide struggled to keep systems secure from cyber criminals. So… SC Media spoke to seven industry experts for their thoughts on the biggest challenges in cybersecurity this year and what businesses can do to protect themselves
-
This is something that’s not new but has gained fresh impetus, importance and is, now, imperative argues consultant Paul Rummery…
-
Covid changed everything in the real and virtual worlds. Organised crime researcher, lecturer and consultant Chris Allen examines how cybercriminals are taking advantage of the turmoil … how you can best protect your business.
-
Your most valuable assets – your executives – are also a criminal's most potent weapons. Here’s what happened with the recent M&S CEO voucher scam, and how you can look out for it…
-
The NHS is slowly replacing old, vulnerable technology, a new report reveals. And it’s an issue we all face. How do you keep complex systems up-to-date? How do you balance the importance of patching with the risk of disruption? And when does fit-for-purpose become dangerously outdated?
-
The UK’s attempted Brexit deal feels uncertain at best and fanciful at worst. But is it all doom and gloom when it comes to Brexit and cyber security? Organised crime researcher, lecturer and consultant Chris Allen takes a look at potential positive outcomes for UK businesses – in the second of this two-part Brexit series…
-
Why CISOs must turn to crisis management strategy to repair data-breach reputations. Here are three essential rules…
-
There are plenty more Phish in the sea. And that’s the problem. Phishing is getting cuter, smarter and our businesses more vulnerable. Here’s a quick reminder on how to help people protect themselves…
-
Billions of Bluetooth devices are vulnerable to attack according to new research, leaving business data on mobile devices and IoT systems open to compromise by attackers. Being aware of this is one thing, successfully protecting is a whole other challenge…
-
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence