Library
Bev Pryce has had a 20-year career in cybersecurity – mostly working in financial institutions – and is now a successful security consultant with expertise in Identity Lifecycle Management. She left school with poor GCSEs, has no A-levels and no degree. This is her story...
-
Big tech dominates the vendor market. It’s time to rethink how and why we’re stuck with them – and why we should look beyond the obvious…
The Secret CISO is a semi-regular column from a range of industry figures. If you’d like to be a Secret CISO for a week and have something the sector needs to hear, please email acting editor edward.craig@haymarket.com
-
In the second of a two-part special, consultant Paul Rummery explains how to navigate the current threat landscape…
-
Listen to the fourth episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the third episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the second episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
In the first of a two-part special, consultant Paul Rummery looks at the current threat landscape and how risk has changed due to increase in remote working.
-
Consultant Paul Rummery has designed this download-and-distribute guide for your non-cyber specific staff – an easy hand-out as we enter a new world or hybrid working, where discipline, BYOD and best practice may collide.
-
- Download
Making detection-and-response a business priority (and how to explain the value to the board)
As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…
Listen to the first episode in this podcast series with Adarma about how to minimise the impact of a breach, hosted by SC Media Associate Editor Kathryn Cave.
-
The battles between network and security teams are legendary – and not improving. But, as Kathryn Cave explains, we’re family and, as we don’t get to choose family, we’ve got to find a way to muddle along constructively. Here’s some salient advice…
-
In part two of this ransomware special, Davey Winder talks to experts about ransomware payments: the mechanics, negotiation tactics, cryptocurrency transfers, ethics and business continuity... You need to pay attention!
-
Secure your place at the Akamai Security Summit EMEA all-digital event to hear from your peers and industry experts on the latest cybersecurity trends, tools and strategies for global cyber threat protection.
-
In part one of this ransomware special, Davey Winder talks to experts about the rise of criminal cooperation, how this has propelled ransomware to the top of the attack tree and analyses how organisations should respond…
-
Download this SC Media UK e-book, produced in partnership with Redscan, as we outline some of the key factors to consider when planning a cloud monitoring strategy – and the steps you can take to improve your overall success.
-
- Download
What’s your mitigation strategy against a slow-burn, long-term threat? It’s an increasing headache. Here’s what you need to look out for…
-
A few simple steps from industry professionals could make a profound difference – this is not an option, it’s an imperative, says Dr Yulia Cherdantseva, a cyber skills lead at the Centre for Cyber Security Research at Cardiff University
-
Securing Microsoft Office 365 in the new normal: Closing the gap between attackers and defenders
As many businesses rapidly switch to remote operations, it is no surprise that we saw an almost unanimous increase in organisations extending their use of the ubiquitous Microsoft Office 365 for collaboration. This report, in partnership with Vectra, offers advice on checking whether your confidence is well founded – or naive.
-
- Download
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence