Library
The anti-virus trailblazer, who died recently, led an eventful life – as well as being at the forefront of our nascent sector… Here’s an instant run down
-
![Employees: the great threat – how to keep your business safe and productive](https://c-assets.papillon.io/image/fetch/s--YnOMApIW--/f_auto/https://dkf1ato8y5dsg.cloudfront.net/uploads/8/79/640x360-gettyimages-155372496.jpg)
Employees: the great threat – how to keep your business safe and productive
Read this SC Media UK whitepaper, produced in partnership with Magnet Forensics, as we discuss how, why and where you can use technology to keep your employees safe and productive – and your business firing
-
- Download
Bev Pryce has had a 20-year career in cybersecurity – mostly working in financial institutions – and is now a successful security consultant with expertise in Identity Lifecycle Management. She left school with poor GCSEs, has no A-levels and no degree. This is her story...
-
Big tech dominates the vendor market. It’s time to rethink how and why we’re stuck with them – and why we should look beyond the obvious…
The Secret CISO is a semi-regular column from a range of industry figures. If you’d like to be a Secret CISO for a week and have something the sector needs to hear, please email acting editor edward.craig@haymarket.com
-
In the second of a two-part special, consultant Paul Rummery explains how to navigate the current threat landscape…
-
Listen to the fourth episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the third episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the second episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
In the first of a two-part special, consultant Paul Rummery looks at the current threat landscape and how risk has changed due to increase in remote working.
-
Consultant Paul Rummery has designed this download-and-distribute guide for your non-cyber specific staff – an easy hand-out as we enter a new world or hybrid working, where discipline, BYOD and best practice may collide.
-
- Download
![Adarma](https://c-assets.papillon.io/image/fetch/s--YnOMApIW--/f_auto/https://dkf1ato8y5dsg.cloudfront.net/uploads/8/79/1-adarma-logo.png)
![Making detection-and-response a business priority (and how to explain the value to the board)](https://c-assets.papillon.io/image/fetch/s--YnOMApIW--/f_auto/https://dkf1ato8y5dsg.cloudfront.net/uploads/8/79/640x360-pexels-sora-shimazaki-5935791-1.jpg)
Making detection-and-response a business priority (and how to explain the value to the board)
As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…
Listen to the first episode in this podcast series with Adarma about how to minimise the impact of a breach, hosted by SC Media Associate Editor Kathryn Cave.
-
The battles between network and security teams are legendary – and not improving. But, as Kathryn Cave explains, we’re family and, as we don’t get to choose family, we’ve got to find a way to muddle along constructively. Here’s some salient advice…
-
In part two of this ransomware special, Davey Winder talks to experts about ransomware payments: the mechanics, negotiation tactics, cryptocurrency transfers, ethics and business continuity... You need to pay attention!
-
Secure your place at the Akamai Security Summit EMEA all-digital event to hear from your peers and industry experts on the latest cybersecurity trends, tools and strategies for global cyber threat protection.
-
In part one of this ransomware special, Davey Winder talks to experts about the rise of criminal cooperation, how this has propelled ransomware to the top of the attack tree and analyses how organisations should respond…
-
![Redscan](https://c-assets.papillon.io/image/fetch/s--YnOMApIW--/f_auto/https://dkf1ato8y5dsg.cloudfront.net/uploads/8/79/1-redscan-kroll-logo-grey.png)
Download this SC Media UK e-book, produced in partnership with Redscan, as we outline some of the key factors to consider when planning a cloud monitoring strategy – and the steps you can take to improve your overall success.
-
- Download
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence