News cyberattacks

Joe Evangelisto, CISO, NetSPI.

Beyond CISO Scapegoating: Cultivating Company-Wide Security Mindsets

In the evolving cybersecurity landscape, the role of the Chief Information Security Officer (CISO) has transformed from a solitary defender to a collaborative leader. As cyber threats grow more sophisticated, businesses must adopt a proactive, company-wide security culture, emphasizing collaboration, regulatory compliance, and continuous improvement to safeguard against increasing risks.

4 min
Silicon UK In Focus Podcast

Silicon In Focus Podcast: Open Source, Open Security?

As security continues to be a significant issue as businesses innovate, today’s podcast considers the factors impacting the secure use of open source and how businesses can be more proactive with security as they create new applications.

1 min
The State of Quantum Security

The State of Quantum Security

No longer a technology on the distant horizon, quantum computing brings with it security challenges that all enterprises must pay close attention to. So, what does this mean for digital security in an age of quantum computing capability?

12 min
A hacker surrounded by data. Cyberattacks
Brand Voice

Beating the Barbarians: How to Protect Your Workers from Cyberattacks

The pandemic forced businesses to make radical changes to how they organised their workforces. A shift to mass remote working is bringing with it a renewed need to ensure robust and flexible digital security systems are in place when remote workers connect to what can be sensitive data.

3 min
The Future of Digital Identity

The Future of Digital Identity

How individuals identify themselves in the digital space must be secure. However, with a rise in identity theft and technologies such as deepfakes, how we secure digital identities is being challenged. In a post-COVID business landscape, how can enterprises and citizens alike maintain a comprehensive, integrated and robust digital identity?

17 min
How to identify and defend your business’s threat perimeter

Where is Your Threat Perimeter?

As business transform into agile organizations, the traditional perimeters a company could defend against attack have expanded and become less well-defined. In an age where mobile devices, the cloud and the burgeoning IoT revolution, how does security need to change to protect businesses in this new world of fluid data?

15 min
Advertising