Library
The MoD recently announced the findings of its first Bug Bounty challenge – the program was a 30-day, hacker-powered security test aimed at finding flaws before the real hackers can exploit them
-
Nicola Whiting, co-owner of Titania Group, explains why developing a diverse workforce isn’t simply an ethical imperative, it’s a business – and security – essential. And there’s a diversity type that’s not so visible, is often overlooked but has a profound impact: neurodiversity
-
Because your people are your organisation’s least secure endpoint, Jason Stirland, CTO at DeltaNet International, offers an instant checklist into how effective your employee cybersecurity training really is…
-
Here, SC Media UK tells you three ways you can get your procurement department onside when it’s time for urgent investment...
-
The anti-virus trailblazer, who died recently, led an eventful life – as well as being at the forefront of our nascent sector… Here’s an instant run down
-

Employees: the great threat – how to keep your business safe and productive
Read this SC Media UK whitepaper, produced in partnership with Magnet Forensics, as we discuss how, why and where you can use technology to keep your employees safe and productive – and your business firing
-
- Download
Bev Pryce has had a 20-year career in cybersecurity – mostly working in financial institutions – and is now a successful security consultant with expertise in Identity Lifecycle Management. She left school with poor GCSEs, has no A-levels and no degree. This is her story...
-
Big tech dominates the vendor market. It’s time to rethink how and why we’re stuck with them – and why we should look beyond the obvious…
The Secret CISO is a semi-regular column from a range of industry figures. If you’d like to be a Secret CISO for a week and have something the sector needs to hear, please email acting editor edward.craig@haymarket.com
-
In the second of a two-part special, consultant Paul Rummery explains how to navigate the current threat landscape…
-
Listen to the fourth episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the third episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
Listen to the second episode in this podcast series with Adarma about how to minimise the impact of a breach.
-
In the first of a two-part special, consultant Paul Rummery looks at the current threat landscape and how risk has changed due to increase in remote working.
-
Consultant Paul Rummery has designed this download-and-distribute guide for your non-cyber specific staff – an easy hand-out as we enter a new world or hybrid working, where discipline, BYOD and best practice may collide.
-
- Download


Making detection-and-response a business priority (and how to explain the value to the board)
As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…
Listen to the first episode in this podcast series with Adarma about how to minimise the impact of a breach, hosted by SC Media Associate Editor Kathryn Cave.
-
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence