Articles
Cyberterrorism and the Connected Car: The Growing Threat To Automotive Security
-
From university graduates to seasoned analysts, eSentire’s SOC is building the next generation of cyber talent.
-
Chinese Threat Actor MURKY PANDA Identified. Active Since 2023
-
It’s now six months since the EU’s Digital Operational Resilience Act (DORA) came into effect. How seriously is compliance being taken, and how much is it a priority for firms?
-
Compromised at the Core: Why Identity Remains Cyber’s Biggest Flaw
Whether phished, sprayed, bought, or stolen, credentials remain the most consistent point of failure in enterprise security.
-
Vibe Coding: A Programming Revolution or the Next Security Crisis?
-
Information obtained was primarily commonly available business contact information such as names, email addresses and phone numbers.
-
Security and product priorities often operate on different timelines; how can product managers frame cyber risk in ways that influence roadmaps, earn trust, and drive meaningful change.
-
Making Pen Testing a Year-Round Cybersecurity Strength
-
What was the result of the government consultation on banning ransom payments and how easy will it be to implement in practice?
-
Ireland, Spain, France, Bulgaria, Luxemburg, the Netherlands, Portugal and Sweden have failed to add NIS2 to law.
-
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence