Data Breach
The most successful IT directors know how to tailor their messages to the required audience, says Tom Venables, practice director, Turnkey Consulting
-
The figures you see quoted for the cost of a data breach are usually alarming. But how do you relate these figures to your own business, asks Steve Mansfield-Devine...
-
Is it time Britain ushered in a punitive body for corporate cybersecurity negligence? Chris Allen, director of Criminis Consulting and Training thinks so…
-
Listen to the second episode in this podcast series with Adarma about how to minimise the impact of a breach.
-


Making detection-and-response a business priority (and how to explain the value to the board)
As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…
Listen to the first episode in this podcast series with Adarma about how to minimise the impact of a breach, hosted by SC Media Associate Editor Kathryn Cave.
-
Chris Allen, consultant, lecturer and researcher in organised crime, has seen ransomware explode in this year of the pandemic… and has a sustainable answer to avoid payment
-
The Twitter hack exposes the need to do more to protect employees from social-engineering attacks. It’s a hack of high-profile accounts that shows the need for robust controls on verifying access…
-

Join this SC Media UK webinar, in partnership with BeyondTrust, to discover that six popular beliefs about Privileged Access Management (PAM) are, in fact, wrong.


Patching the hole in the SOC: How machine learning techniques and human analysts can work together to protect sensitive data
-
- Download



Threat Intelligence Automation: Creating an effective threat response
It is not just attack frequency that is evolving but threat and network complexity as well, and both impact upon the capacity of the enterprise to effectively mitigate the breach risk.
-
- Download

Many companies continue to leave themselves vulnerable to a major breach by overlooking how they manage their privileged accounts. Here, we outline best practices and provide tips on how to protect your firm from attack.
-
- Download
No more items to load
Load moreAn error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence