Library
Secure your place at the Akamai Security Summit EMEA all-digital event to hear from your peers and industry experts on the latest cybersecurity trends, tools and strategies for global cyber threat protection.
-
In part one of this ransomware special, Davey Winder talks to experts about the rise of criminal cooperation, how this has propelled ransomware to the top of the attack tree and analyses how organisations should respond…
-

Download this SC Media UK e-book, produced in partnership with Redscan, as we outline some of the key factors to consider when planning a cloud monitoring strategy – and the steps you can take to improve your overall success.
-
- Download
What’s your mitigation strategy against a slow-burn, long-term threat? It’s an increasing headache. Here’s what you need to look out for…
-
A few simple steps from industry professionals could make a profound difference – this is not an option, it’s an imperative, says Dr Yulia Cherdantseva, a cyber skills lead at the Centre for Cyber Security Research at Cardiff University
-

Securing Microsoft Office 365 in the new normal: Closing the gap between attackers and defenders
As many businesses rapidly switch to remote operations, it is no surprise that we saw an almost unanimous increase in organisations extending their use of the ubiquitous Microsoft Office 365 for collaboration. This report, in partnership with Vectra, offers advice on checking whether your confidence is well founded – or naive.
-
- Download
A new report suggests criminalising the paying of ransom demands might change everything – but could it result in mutual assured destruction as cyber security goes nuclear? Organised crime researcher, lecturer and consultant Chris Allen takes a look
-
Hackers are primed to take advantage of providers’ lack of understanding of cloud security. Here’s an instant checklist on what to look out for…
-

Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant.
It’s a simple idea, but difficult to put in place: let’s work together to combat the criminals. Crime researcher, lecturer and consultant Chris Allen takes a look at a new piece of research offering all organisations guidance… and hope.
-
It’s been a month since the Chartered Institute of Information Security (CIISec) released its damning research into the state of gender equality and balance in cybersecurity. How did the sector react to the findings? What, if anything, has actually happened as a result – and one month later, what exactly have we learned?
-
Richard Forrest, senior associate at one of the UK’s leading data breach solicitors Hayes Connor, provides five tips to reduce your risk of a data breach…
-

In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.
Despite the pandemic accelerating the importance of cyber security, less than half of global business leaders and employees can name their CISO, a new report finds. Here’s how you can change that. By Rene Millman
-
Online and offline criminals are mimicking big businesses, setting up corporate structures and offices to make operations more efficient and to act as cover. Organised crime researcher, lecturer and consultant Chris Allen explains that this level of sophistication means we all need to be wary
-

How does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.
In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations.
How vulnerabilities are discovered, disclosed and dispatched makes a significant difference to risk management. And new research says we’re getting it wrong. Mark Mayne investigates…
-
Increasing the variety of minds and people in our sector is not simply a nice-to-have: it’s an operational imperative. Owanate Bestman is a cybersecurity specialist recruiter with first-hand experience of creating gender-balanced security departments. Here’s how he does it…
-
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence