Library

From retail to healthcare to manufacturing, mid-sized organisations need digital backbones that deliver both agility and stability. It is a crucial time for IT professionals to evolve and refine their organisation’s digital foundations, and to find smarter ways of getting things done.
-
- Download
We’re all used to gloom and doom, political upheaval, pandemic woes, economic cliff-edges and all sorts of macro risks that, sometimes, we forget to look at the stuff that’s going right. To brighten this January, here’s one such example: hackers are failing to keep up with the pace of new vulnerabilities found in software and hardware.
-
Chris Allen, organised crime researcher, lecturer and consultant, picks five must-reads for any cybersecurity professional
-
Sensors reported a staggering 199.7 million ransomware attacks globally in the third quarter of 2020, as organisations worldwide struggled to keep systems secure from cyber criminals. So… SC Media spoke to seven industry experts for their thoughts on the biggest challenges in cybersecurity this year and what businesses can do to protect themselves
-
This is something that’s not new but has gained fresh impetus, importance and is, now, imperative argues consultant Paul Rummery…
-
Covid changed everything in the real and virtual worlds. Organised crime researcher, lecturer and consultant Chris Allen examines how cybercriminals are taking advantage of the turmoil … how you can best protect your business.
-

This Expert report looks into how AI-enhanced behavioural analytics can identify the most challenging threats in your network and help future-proof your cyber security strategy.
Download your copy now and find out the 4 questions to ask when evaluating NDR vendors.
-
- Download

You need to be a big organisation to protect against every threat in-house these days. And even if you’re a big firm, you need the right people in place and access to the right advice – as well as flexible, agile cyber security infrastructure. In this Sophos’ MDR Buyers’ Guide, it'll navigates you through the choppy waters of first deciding to out-source security operations, part or whole – then actually doing it.
-
- Download
Your most valuable assets – your executives – are also a criminal's most potent weapons. Here’s what happened with the recent M&S CEO voucher scam, and how you can look out for it…
-
The NHS is slowly replacing old, vulnerable technology, a new report reveals. And it’s an issue we all face. How do you keep complex systems up-to-date? How do you balance the importance of patching with the risk of disruption? And when does fit-for-purpose become dangerously outdated?
-
Office 365 has around 250 million active users globally. It dominates. Unsurprisingly it’s attracting cyber attacks. But as this report from Vectra investigates, attackers focus on account takeovers rather than email compromise to gain initial access. Identity is the biggest risk.
-
- Download
The UK’s attempted Brexit deal feels uncertain at best and fanciful at worst. But is it all doom and gloom when it comes to Brexit and cyber security? Organised crime researcher, lecturer and consultant Chris Allen takes a look at potential positive outcomes for UK businesses – in the second of this two-part Brexit series…
-

In this webinar, in partnership with Sophos, the experts' choice for cyber security, we look at common mistakes and how to build an effective incident response plan

With the size, number and frequency of data breaches increasing every year, pressures caused by external security threats have never been greater. At the same time, the rise of remote working has increased the opportunity for cybercriminals to unprecedented levels.
-
- Download
Why CISOs must turn to crisis management strategy to repair data-breach reputations. Here are three essential rules…
-
Why OneSpan took home an SC Europe 2020 Award
The SC Europe Awards celebrate the companies, products and people that excel in cybersecurity. We find out why the judges were keen to commend OneSpan this year
-
There are plenty more Phish in the sea. And that’s the problem. Phishing is getting cuter, smarter and our businesses more vulnerable. Here’s a quick reminder on how to help people protect themselves…
-
Billions of Bluetooth devices are vulnerable to attack according to new research, leaving business data on mobile devices and IoT systems open to compromise by attackers. Being aware of this is one thing, successfully protecting is a whole other challenge…
-

The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too?
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence