Critical Infrastructure
Ukraine in crisis: How to prepare for cyber attacks
As Russia launches a full-scale invasion into Ukraine, how can your organisation remain resilient to strategic western-targeted cyber attacks?
-
Amid a slew of world-altering events, the last 12 months saw cybersecurity concerns firmly edge their way into mainstream global consciousness, writes Rene Millman
-
The UK witnessed a harrowing number of breaches in 2021, according to the National Cyber Security Council (NCSC). The hard definition between online and the real world is blurring. Here’s how to protect your business...
-
The process of signing and signatures has always been susceptible to fraud but as technology has progressed, the act of signing has become far more secure than in the past, to the point where wet signatures can be considered more risky compared to digital signatures, especially in the context of remote business.
In this long-read article, in association with Entrust, we look at why digital signatures are so paramount for security, and the connection it has with PKI.
-

From retail to healthcare to manufacturing, mid-sized organisations need digital backbones that deliver both agility and stability. It is a crucial time for IT professionals to evolve and refine their organisation’s digital foundations, and to find smarter ways of getting things done.
-
- Download
Office 365 has around 250 million active users globally. It dominates. Unsurprisingly it’s attracting cyber attacks. But as this report from Vectra investigates, attackers focus on account takeovers rather than email compromise to gain initial access. Identity is the biggest risk.
-
- Download

Defending modern global organisations is at the mercy of how quickly and efficiently you can turn data into intelligence and make informed decisions.
-
- Download

Simpler together: Forward-thinking CIOs are moving towards a simpler future
In order to meet contemporary data challenges head on, cyber-security professionals need a contemporary - forward-thinking, even - strategy. The emerging solution is the ready-to-roll Hyper-Converge Infrastructure, the newest line of defence in data security
-
- Download

How to find a unified security strategy for your hyper-converged future
As data spreads unstoppably across physical, cloud and virtual space, you need a hyper-converged infrastructure. Not only that, you need one which is consistent, continuous and compliant
-
- Download
No more items to load
Load moreAn error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence