In the news

Filter by
Choose a date range
Search by keyword
AI

Agentic AI: The Promise and Peril of Autonomous Intelligence

While conventional AI remains bound to pre-defined tasks, agentic systems can independently interact with databases,…

published 17 - November - 2025
Read More
Security Week

Beyond the Black Box: Building Trust and Governance in the Age of AI

As AI systems grow more autonomous and are embedded into high-stakes decisions, such as hiring,…

published 13 - November - 2025
Read More
AI

Follow Pragmatic Interventions to Keep Agentic AI in Check

Agentic AI shifts the conversation about AI from passive tools to autonomous systems that can…

published 10 - November - 2025
Read More
Digital Insurance

AI governance demands a new era of board oversight

Artificial intelligence has made a fast leap from a specialized technology to a central topic…

published 07 - November - 2025
Read More
Technology

Technology Addiction: The Hidden Cybersecurity Threat

Massachusetts lawmakers are finally confronting a reality that parents and educators have long recognized: Our…

published 06 - November - 2025
Read More
Help Net Security

AI security governance converts disorder into deliberate innovation

AI security governance provides a stable compass, channeling efforts and transforming AI from an experimental…

published 23 - September - 2025
Read More
Security Today

Unlocking Trustworthy AI: Building Transparency in Security Governance

In situations where AI supports important security tasks like leading investigations and detecting threats and…

published 17 - September - 2025
Read More
Forbes

Mastering Control In The Era Of AI And Transformative Change

In the age of digital-first, organizations are confronted with an unprecedented degree of technological disruption.…

published 01 - September - 2025
Read More
The European Magazine

How AI agents are supercharging cybercrime

AI agents capable of acting on their own are being deployed to scan networks, launch attacks, and bypass traditional security systems.

published 28 - August - 2025
Read More
CyberSecurity Magazine

Shadow AI: The hidden risk in AI adoption

Discover how shadow AI risks threaten enterprise security, compliance, and trust, and learn strategies to identify and control hidden AI adoption.

published 25 - August - 2025
Read More
Supply Chain Brain

Five Ways to Mitigate Supply Chain Risks in Retail and Manufacturing

Recent cyberattacks against widely distributed networks have rattled sectors that previously thought themselves immune from attack.

published 11 - August - 2025
Read More
Digital Insurance

Why cyber due diligence should be part of any M&A strategy

In the high stakes of mergers and acquisitions, financial due diligence is everything. But there’s a critical dimension of risk that is often overlooked, and that is cybersecurity.

published 30 - July - 2025
Read More
SC Media

Why a decade-long freeze on all state AI regs doesn’t make sense

Steve Durbin explores why a proposed 10-year freeze on state-level AI regulations could undermine innovation, accountability, and public trust.

published 03 - July - 2025
Read More
Forbes

How Tariff Volatility Creates Opportunities For Bad Actors

Tariff volatility can disrupt supply chains and expose businesses to cyber security threats. Learn how rapid responses to tariff changes may create vulnerabilities for bad actors to exploit.

published 01 - July - 2025
Read More
Other

Chief Risk Officers: Top 8 concerns for managing resilience

Discover from Steve Durbin the top 8 strategic concerns CROs face in 2025, from balancing innovation and compliance to managing AI risks and ensuring organisational resilience.

published 16 - June - 2025
Read More
SC Media

Supply chain security faces new uncertainty amid President Trump’s cyber EO

Steve Durbin highlights growing cyber risks as Trump’s executive order fuels new uncertainty in global supply chain security and regulatory expectations.

published 12 - June - 2025
Read More
Forbes

Understanding The Weaponization Of Agentic AI

Steve Durbin unpacks how agentic AI's autonomous capabilities are being exploited by cybercriminals, posing new threats to cybersecurity and reshaping digital risk landscapes.

published 30 - May - 2025
Read More
World Economic Forum

How trade policies are expanding supply chain cyber risks

Explore how evolving trade policies are increasing cyber risks across global supply chains, and what businesses and policymakers can do to mitigate these threats.

published 15 - May - 2025
Read More
Other

Security Trends Reshaping Enterprise Resilience Into 2027

Explore five critical security trends transforming enterprise resilience through 2027, from digital identity threats to global data fragmentation and AI-driven risks.

published 05 - May - 2025
Read More
Forbes

Five Key Elements To Consider Before Designing A Cyber Exercise

Discover the five essential elements to consider before designing a cyber exercise, ensuring your organization is prepared, resilient, and ready to respond to cyber threats effectively.

published 25 - April - 2025
Read More
Security Boulevard

The Human Advantage in the Age of Technological Uncertainties

Technology is an enabler in countless ways. It has empowered a range of shifts in…

published 24 - April - 2025
Read More
Other

Agentic AI Can Be Force Multiplier — for Criminals, Too

Steve Durbin reveals how malicious actors are developing teams of autonomous AI systems that can evade traditional security measures through techniques like polymorphic code generation and data poisoning.

published 21 - April - 2025
Read More
Help Net Security

Excessive agency in LLMs: The growing risk of unchecked autonomy

For an AI agent to “think” and act autonomously, it must be granted agency; that…

published 08 - April - 2025
Read More
Digital Insurance

Understanding the EU's Digital Operational Resilience Act

Steve Durbin explores the EU's Digital Operational Resilience Act (DORA), highlighting its significance for financial services.

published 06 - April - 2025
Read More
Forbes

Using Defensive AI As A Countermeasure To AI Threats

Steve Durbin explores how defensive AI can effectively counteract sophisticated cyber threats in this insightful Forbes article.

published 24 - March - 2025
Read More
Manufacturing.net

The Building Blocks of Data Security

Explore the essential building blocks of data security in this insightful feature on Manufacturing.net by Steve Durbin.

published 11 - March - 2025
Read More
Dark Reading

CISA Cuts: A Dangerous Gamble in a Dangerous World

Steve Durbin explores impact on global risk management. Learn why CISA cuts are considered a dangerous gamble in an increasingly volatile world.

published 06 - March - 2025
Read More
InformationWeek

Winning the War Against Social Media Disinformation

Explore Steve Durbin's insights on tackling social media disinformation through media literacy, critical thinking, and platform accountability.

published 06 - March - 2025
Read More
SC Media

How OSINT awareness can mitigate social-engineering attacks

Discover how OSINT awareness can mitigate social engineering attacks in Steve Durbin's latest SC Media feature.

published 05 - March - 2025
Read More
The European

Navigating Risk Amidst Global Geopolitical Tensions and Uncertainty

Steve Durbin details five key areas where organisations and their risk managers must allocate efforts to navigate these uncertain times.

published 23 - January - 2025
Read More
The European

The Evolving Role of the CISO: From tech expert to business partner

Paul Watts examines security leadership in a shifting threat landscape, sharing ways to better align cybersecurity with business goals.

published 23 - January - 2025
Read More
The European

The Importance of Cyber Exercises in Cyber Resilience

Callum Moore explores the role of cyber simulation exercises in cyber resilience and how to gain buy-in from corporate leaders.

published 23 - January - 2025
Read More
The European

Balancing the Risks and Rewards of AI

Steve Durbin guides organisations on ensuring that the usage and adoption of AI is managed in a secure, ethical and responsible manner.

published 23 - January - 2025
Read More
Forbes

Seven Trends Shaping Cyber Threats and Risk Management for 2025

Discover the seven key trends shaping cyber threats and risk management for 2025, as outlined by Steve Durbin.

published 13 - January - 2025
Read More
Other

Navigating Boardroom Concerns: Top nine cybersecurity risks and challenges

Explore with Steve Durbin the top cybersecurity concerns for boardrooms, from data breaches to AI-powered threats.

published 15 - December - 2024
Read More
Forbes

How Organisations Can Prepare For Attacks On Critical Infrastructure

Discover from Steve Durbin how your organisation can defend against increasing cyber threats from state-backed adversaries.

published 03 - December - 2024
Read More
Forbes

How to Communicate Cybersecurity More Effectively to The Board

Featured in Forbes, ISF CEO Steve Durbin shares his guidance on how security leaders can enable the board to make informed security decisions.

published 20 - November - 2024
Read More
Forbes

Navigating Divisions In The Workplace: The impact of social media and rise of individual ideologies

Featured in Forbes, ISF CEO Steve Durbin explores the impact and influence of social media in shaping opinions and disseminating news.

published 31 - October - 2024
Read More
Help Net Security

The Quantum Dilemma: Game-changer or game-ender

ISF CEO Steve Durbin explores some of the top risks, concerns, and uncertainties on the horizon for quantum computing.

published 14 - October - 2024
Read More
Cybersecurity Insiders

Technology Governance Needs a Rethink on Prioritising Resilience Against Digital Threats

Research shows that only 3% of businesses have developed true resilience against cyber threats. ISF CEO Steve Durbin shares primary reasons for this disparity.

published 11 - October - 2024
Read More
People

EXPERT OPINION: Stop Talking About Security Awareness - Let's encourage secure behaviour and culture instead

ISF Expert Richard Absalom explores why organisations need to move beyond awareness; sharing guidance on how to focus on security culture instead.

published 08 - October - 2024
Read More
Forbes

Five Strategies For Boards To Enhance Governance And Resilience In The Face Of Evolving Cyber Risks

ISF CEO Steve Durbin shares five strategies on how board members can better manage and govern cyber security.

published 11 - September - 2024
Read More
Digitalisation World

Who are BISOs and what do they bring to the cybersecurity table?

Steve Durbin, ISF Chief Executive shares his thoughts on why organisations need a BISO and what traits are ideally suited for the role.

published 05 - September - 2024
Read More
Technology

The Impact of Technology Failures on Business Resilience

Steve Durbin, ISF CEO shares 5 important factors to consider when trying to mitigate and counterbalance business impact of technology failures

published 26 - August - 2024
Read More
People

Strategies for Security Leaders: Building a positive cybersecurity culture

ISF CEO Steve Durbin shares his best practices on how security leaders can develop a positive brand and culture for cyber security.

published 20 - August - 2024
Read More
Risk

Striking a Balance Between Business Growth, Risk Management, and Cybersecurity

Featured in Security Boulevard, ISF CEO, Steve Durbin shares recommendations on how to balance business growth with risk management.

published 16 - August - 2024
Read More
Forbes

The 6 Elements Defining a Valid Cybersecurity Strategy

Featured in Forbes, ISF CEO Steve Durbin explains how you can maximise value from existing cybersecurity investments to inform strategy.

published 15 - August - 2024
Read More
Risk

EXPERT OPINION: Resilient by design is the way forward

ISF Head of Research, Paul Holland outlines the essential steps to ensure your organisation is well-positioned for cyber resilience.

published 15 - August - 2024
Read More
People

From Cartels to Crypto: Trends Show Disruptive Cybercrime Evolving Rapidly

ISF CEO Steve Durbin explains why rise of cybercrime-as-a-service amongst other trends, are lowering entry barriers for criminals.

published 13 - August - 2024
Read More
Supply Chain

EXPERT OPINION: It'll never happen to us

ISF Head of Tools & Methodologies, Alex Jordan shares his expert opinion on managing extinction level risks associated with suppliers.

published 07 - August - 2024
Read More
Technology

EXPERT OPINION: Social Engineering Attacks: Understanding OSINT to mitigate risk

Over the last decade, OSINT (open-source intelligence) became a buzzword across many industries and lines…

published 06 - August - 2024
Read More
Risk

5 recommendations for acing the SEC cyber security rule

SEC risk management and disclosure rules can be fraught with difficulties. Steve Durbin, chief executive of the ISF, offers advice for coping.

published 01 - August - 2024
Read More
Risk

EXPERT OPINION: If we fail to prepare, we prepare to fail

ISF Head of Research, Paul Holland shares his expert opinion on incident preparedness and overcoming extinction level attacks.

published 01 - August - 2024
Read More
People

EXPERT OPINION: The bigger they are, the harder we will all fall

"It’ll never happen to us." Most security and risk practitioners have faced this argument at…

published 25 - July - 2024
Read More
Governance

Readying Your Company For The New SEC Cyber Incident Disclosure And Risk Management Rules

Featured in Forbes, ISF CEO Steve Durbin breaks down the SEC material incident disclosure and enhanced governance requirements.

published 12 - July - 2024
Read More
Security Boulevard

Generative AI vs. Predictive AI: A Cybersecurity Perspective

Featured in Security Boulevard, ISF CEO Steve Durbin underscores how organisations can find value in predictive and GenAI implementation.

published 11 - July - 2024
Read More
Risk

ISF: Your first line of defence

Interviewed by The European, ISF CEO, Steve Durbin shares the ISF perspective on implementing an effective cyber strategy

published 11 - July - 2024
Read More
PropertyCasualty360

The Core Elements of a Cybersecurity Posture

ISF CEO Steve Durbin shares seven core elements that can lay the groundwork for a healthy cybersecurity posture.

published 27 - June - 2024
Read More
Dark Reading

Key Takeaways from the British Library Cyberattack

Featured in Dark Reading, ISF CEO, Steve Durbin shares key takeaways from the event, with guidance on practicing good information governance.

published 25 - June - 2024
Read More
People

The New Security Leader: Less Techy, More Business-Savvy

ISF Distinguished Analyst, Paul Watts features in InfoRisk Today to share his perspectives on balancing cyber risk and business goals.

published 17 - June - 2024
Read More
Help Net Security

Urgently needed: AI governance in cyber warfare

Featured in Help Net Security magazine, ISF CEO Steve Durbin outlines the importance aligning AI's ethics with society’s fundamental values.

published 13 - June - 2024
Read More
InformationWeek

Weaponized Disinformation Threatens Democratic Values

Steve Durbin, ISF CEO, shares insights into the looming AI-security threats from his interview with Brian Lord, CEO of Protection Group International.

published 11 - June - 2024
Read More
InfoSecurity

#Infosec2024: Cyber Resilience Means Being Willing to Learn From a Crisis

Featured in Infosecurity Magazine, Distinguished ISF Analyst Paul Watts, shares his views on resilience and effective cyber crisis management.

published 07 - June - 2024
Read More
Security Magazine

5 key elements of cyber simulation exercises to boost cyber resilience

Steve Durbin, ISF CEO, shares five key elements required to design cyber simulation exercises aimed at enhancing cyber resilience.

published 07 - June - 2024
Read More
Forbes

The Risks And Rewards Of AI: Strategies For Mitigation And Containment

ISF CEO Steve Durbin explores the major risks AI poses for today and for the future, and how we can address and mitigate these threats.

published 05 - June - 2024
Read More
SC Media

Five ways security leaders can demonstrate the business value of cybersecurity

Steve Durbin, ISF CEO, shares five best practices on how security leaders can justify the business value of cybersecurity and improve alignment with business goals

published 26 - April - 2024
Read More
Forbes

Business Risk Preparation: The Interlocked World Of Technology, Geopolitics, Regulations And Cybersecurity

ISF CEO Steve Durbin features in Forbes to share some of the top risks organisations need to be prepared for; impact of geopolitics on supply chains, environmental challenges of quantum computing and more.

published 24 - April - 2024
Read More
Help Net Security

How to design and deliver an effective cybersecurity exercise

ISF CEO STEVE Durbin featured in Helpnet Security to share his insights on how to design and develop an effective cyber simluation exercise.

published 01 - April - 2024
Read More
Dark Reading

Geopolitical Conflicts: 5 ways to cushion the blow

ISF CEO Steve Durbin featured in Dark Reading to provide guidance on 5 key areas security leaders must navigate to cushion the blow of geopolitical conflicts.

published 29 - March - 2024
Read More
CSO Online

Risky Business: 6 steps to assessing cyber risks for the enterprise

Steve Durbin featured in CSO online, sharing his six steps on how organisations can create risk assessment plans to anticipate future threats.

published 27 - March - 2024
Read More
Governance

ISF Resources to Support the NIST Cybersecurity Framework 2.0

Discover what the latest updates to the NIST CSF mean for your organisation as Head of Tools at the ISF, Alex Jordan, provides his thoughts.

published 20 - March - 2024
Read More
Forbes

Six Steps to Help Leaders Achieve A Good Standard Of Cybersecurity

ISF Chief Executive Steve Durbin, features in Forbes to outline six essential steps for security leaders to enhance their cyber readiness.

published 20 - March - 2024
Read More
Help Net Security

Why data, AI, and regulations top the threat list for 2024

ISF Chief Executive Steve Durbin, features in Helpnet Security to address three cyber security hurdles in 2024 - Data, AI and Regulation.

published 21 - December - 2023
Read More
ISF Expert Opinion

What does the SEC indictment of SolarWinds mean for security leadership?

Paul Watts, Distinguished Analyst at the ISF explores what the SEC indictment of SolarWinds means for security leadership

published 29 - November - 2023
Read More
Dark Reading

EU Tightens Cyber Security Requirements for Critical Infrastructure and Services

Organizations in "essential" sectors have until October 2024 to comply with the Network and Information…

published 15 - November - 2023
Read More
Forbes

Five Ways Security Teams Can Strengthen Business Relationships

Recent global events such as the pandemic have allowed security leaders to showcase the potential…

published 13 - November - 2023
Read More
Cybersecurity Insiders

Navigating Security, Business Continuity, Through a Downturn

With inflationary pressures mounting and downturn fears hovering, it’s natural for organizations to scale back on their overall…

published 07 - November - 2023
Read More
Security Info Watch

Five Ways Enterprises Can Boost Incident Preparedness

Security is not a primary area of expertise for most organizations so preparedness may fall…

published 30 - October - 2023
Read More
Manufacturing Tomorrow

The Hidden Risks of Industrial Control System manufacturers: Why ICS Environments are Vulnerable

Industrial control systems (ICS) such as programmable logic controllers, distributed controls systems, SCADA systems, and operational…

published 20 - October - 2023
Read More
InfoSecurity

Four Data Security Challenges Set to Impact Organisations in the Coming Years

Data is the most durable, limitless commodity driving future economies and offering fresh insights for…

published 25 - September - 2023
Read More
CSO Online

10 principles to ensure strong cybersecurity in agile development

The agile project management philosophy values speed, collaboration, communication, and interaction. Here are some best…

published 14 - September - 2023
Read More
Forbes

The Future Of Work Is Remote: How Organizations Can Prepare For Security Challenges

The fourth industrial revolution is here, and new technologies have the potential to change how…

published 14 - September - 2023
Read More
TechInformed

Building the cyber security workforce of today

Cyber security staffing shortages are being driven by issues such as burnout, a lack of…

published 05 - September - 2023
Read More
Forbes

Eight Steps in Managing Cyber Risk Through A Downturn

I predict that for cybersecurity leaders, 2023 will not be an easy year. On the…

published 14 - August - 2023
Read More
ISF Expert Opinion

Hack on Japanese Port Shows How Compromised Operational Technology Can Have a Widespread Impact

Paul Holland shares his thoughts on protecting and securing the integrity and confidentiality of information within OT environments.

published 17 - July - 2023
Read More
Emerging Threats

How organizations can navigate geopolitical and cyber risks in an interconnected world

Globalization and hyperconnectivity has made the world more interconnected and interdependent than ever before. The…

published 17 - July - 2023
Read More
Security Middle East

Security Middle East Conference: Chairperson’s key takeaways

The inaugural Security Middle East Conference was a major success for the security community. Over…

published 27 - June - 2023
Read More
InformationWeek

Walking the Tightrope: Navigating the risks and rewards of AI

Steve Durbin contributes to InformationWeek to chart the course for the responsible use of artificial intelligence.

published 26 - June - 2023
Read More
InfoSecurity

Infosecurity Europe: Cyber Security Industry Still Fighting to Recruit and Retain Talent

Cybersecurity teams are struggling to find the right talent, with the right skills, and to…

published 21 - June - 2023
Read More
Help Net Security

Why Organisations Should Adopt a Cloud Security Framework

Steve Durbin outlines how choosing the right cloud cyber security framework can strengthen resilience across your entire cloud supply chain.

published 09 - June - 2023
Read More
ISF Expert Opinion

COSMICENERGY: A new threat to OT

Paul Holland provides insight into a possible new threat to operational technology environments, specifically those in the energy sector.

published 02 - June - 2023
Read More
Supply Chain Brain

Navigating Supplier Risk Challenges to Shore Up Cyber Defences

Steve Durbin delves into the key challenges organisations should address in building resilience against supply chain risks.

published 02 - June - 2023
Read More
Forbes

Four Risks and Challenges of AI Democratisation for Businesses

Steve Durbin discusses the potential risks and challenges organisations could face as they increasingly build, use or rely on AI technologies.

published 26 - May - 2023
Read More
Security Middle East

Saudi Vision 2030: Digital challenges and opportunities

Dan Norman, Regional Director, EMEA for the ISF, looks at the challenges and opportunities Saudi…

published 18 - May - 2023
Read More
CSO Online

Top Risks and Best Practices for Securely Offboarding Employees

Outgoing employees pose significant security risks to organizations. Here are some of the major issues…

published 26 - April - 2023
Read More
Architecture & Governance

Invest in Developing a Human-Centred Security Program

Steve Durbin explores steps to developing a human-centred security program that engages your workforce to better protect your organisation.

published 24 - April - 2023
Read More
Security Middle East

Five Cybersecurity Trends for the Middle East in 2023

Dan Norman predicts cybersecurity trends that are set to accelerate for the Middle East in 2023.

published 31 - March - 2023
Read More
Forbes

Achieving The Five Levels Of Information Security Governance

Steve Durbin offers advice on what strategies can be taken to make information security better connected to organisational goals and strategy.

published 23 - March - 2023
Read More
TechTarget

Six Principles for Building Engaged Security Governance

Steve Durbin features in TechTarget to offer insight into engaged governance and the six principles that organisations should implement.

published 15 - March - 2023
Read More
ISF Expert Opinion

Security and the Business: It's good to talk

Paul Watts explores the shifting nature of business, the role of the security leader, and the impact of not aligning to each other’s goals.

published 09 - March - 2023
Read More
CSO Online

Measuring Cyber Security: The what, why and how

Steve Durbin explores the ways security teams can best measure, analyse and report cyber security threats and performance

published 16 - February - 2023
Read More
ISF Expert Opinion

Navigating the Politics of Measuring Security

Richard Absalom explores the soft skills needed to navigate boardroom politics, ensuring measurements support decisions and drive action.

published 15 - February - 2023
Read More
Dark Reading

Build Cyber Resiliency With These Security Threat-Mitigation Considerations

Steve Durbin offers insight into how organisations can get on the path to developing a coherent security strategy.

published 15 - February - 2023
Read More
Tanium

It Pays to Know How Your Cybersecurity Stacks Up

Paul Watts, Distinguished Analyst for the ISF featured in Tanium magazine to share his thoughts on how security professionals can demonstrate value by adopting a shift-left mentality – a proactive stance for security that allows companies to become more agile and able to innovate.

published 18 - January - 2023
Read More
Forbes

Four Cyber Risk Trends to Watch in 2023 and How Businesses Can Mitigate Them

With cyber security becoming riskier, costlier and more complicated, Steve Durbin explores four key challenges to look out for in 2023.

published 11 - January - 2023
Read More
Forbes

Six Steps to Better Counter Supply Chain Risks

As vendor risk emerges as a top security priority, Steve Durbin provides tips you can adopt today to better manage your supply chains.

published 19 - December - 2022
Read More
CSO Online

Five Top Qualities You Need to Become a Next-Gen CISO

Steve offers actionable guidelines to building and maintaining the skills and relationships that can take security leaders to the next level.

published 19 - December - 2022
Read More
Security Middle East

Threat Intelligence: Establishing a stream of trustworthy data

Dan Norman explores how you can create a steady stream of meaningful data that is actually relevant to your organisation.

published 05 - December - 2022
Read More
Computer Weekly

Security Think Tank: To stop ransomware, preparation is the best medicine

Paul Watts details what you should be focussing on when thinking about business resiliency in the context of ransomware.

published 24 - November - 2022
Read More
Spiceworks

How Cyber Threat Intelligence Provides Security and Value to Business

Steve Durbin offers his thoughts on how enterprises can make the most out of threat intelligence for smarter security.

published 23 - November - 2022
Read More
Forbes

Best Practices to Help Strengthen Your Company's Security Culture

Human behaviour is one of the biggest challenges faced by security practitioners, leaders and cyber risk managers today.

published 13 - October - 2022
Read More
Dark Reading

Seven Practical Considerations for Effective Threat Intelligence

A background to the current state of threat intelligence, and practical guidance for security teams at all stages of its implementation.

published 05 - October - 2022
Read More
TechTarget

Solve ICS Security Issues with ICS and IT Team Convergence

Threat actors are predicted to weaponise industrial control systems in order to harm or kill humans by 2025 - how should you prepare?

published 29 - September - 2022
Read More
PropertyCasualty360

The Threat of Deepfakes and Their Security Implications

Steve Durbin discusses the cyber best practices and security controls you should be implementing now to mitigate the threat of deepfakes.

published 07 - September - 2022
Read More
Forbes

Securing Industrial Control Systems: The What, Why and How

Steve Durbin featured in Forbes to shed light on the best practices you should consider to better protect ICS environments.

published 30 - August - 2022
Read More
World Economic Forum

How the Responsible Use of AI Can Create Safer Online Spaces

Steve Durbin offers recommendations for organisations to mitigate the potential risks and manage the ethical adoption of AI.

published 16 - August - 2022
Read More
Forbes

Organisations Cannot Prosper Without Trust: Five ways to boost trust with cyber security

Steve Durbin offers advice on how you can prevent the dilution of enterprise value and trust in the eyes of your stakeholders.

published 04 - August - 2022
Read More
CSO Online

Five Trends Making Cyber Security Threats Riskier and More Expensive

As risks increase with the world becoming more digital, regulated, and interconnected, Steve Durbin offers steps to reduce their impact.

published 27 - July - 2022
Read More
Computer Weekly

Cyber Insurance: An effective use of your scant security budget?

Paul Watts questions whether cyber insurance is a must-have item, an expensive luxury, or the emperor’s new clothes.

published 21 - July - 2022
Read More
Dark Reading

Three Cyber Threats Resulting from Today's Technology Choices to Hit Businesses by 2024

Steve Durbin features in Dark Reading to discuss three major cyber threats that could result from today's hasty technology decisions.

published 13 - July - 2022
Read More
Computer Weekly

Security Think Tank:
Balanced approach can detangle supply chain complexity

Francesca Williamson shares insight on how you can detangle the complexities of the supply chain and create better security practices.

published 08 - July - 2022
Read More
TechTarget

Three Threats Dirty Data Poses to the Enterprise

Steve Durbin discusses three dirty data cyber security concerns, and how organisations can protect themselves against these emerging threats.

published 06 - July - 2022
Read More
Forbes

Ignoring Cyber Security Can Sour M&A Deals

Steve Durbin featured in Forbes to highlight key cyber security dimensions to consider when entering the merger and acquisition process.

published 05 - July - 2022
Read More
World Economic Forum

Six Steps to Validate Cyber Incident Response Plans in Times of Conflict

Steve Durbin features in the World Economic Forum, offering considerations to consider when evaluating cyber incident response capabilities.

published 28 - June - 2022
Read More
Supply Chain Brain

Five Ways to Secure the Supply Chain in Times of Conflict

Steve explains the five steps organisations can take to help mitigate potential threats against the supply chain and be better armed.

published 15 - June - 2022
Read More
PropertyCasualty360

Three Unintended Consequences of Well-Intentioned Cyber Regulations

Steve explains how you can prepare against unintended consequences of cyber regulations, no matter how well-intentioned they might be.

published 10 - June - 2022
Read More
Forbes

What's Zero Trust, and What's Driving Its Adoption?

Steve Durbin deconstructs Zero Trust; explaining how it works, what the common misconceptions are, and what to consider before implementation.

published 08 - June - 2022
Read More
Security Magazine

7 Steps to Combat Cybersecurity Threats in Times of Instability

Steve Durbin outlines steps organisations and security teams can use to understand and prepare for potential threats in times of instability.

published 18 - May - 2022
Read More
Forbes

How Cybersecurity Leaders Can Add Value to M&A Deals

Steve Durbin offers advice on the M&A process: how you can mitigate risk and highlight to leadership the value of information security.

published 10 - May - 2022
Read More
Emerging Threats

World's Largest Cybersecurity Benchmarking Study Finds that Top Executives Believe their Organizations are Not Prepared for New Era of Risk

ThoughtLab's press release for their study, providing evidence-based insights into the most effective cybersecurity practices and investments.

published 10 - May - 2022
Read More
Emerging Threats

Cyber Risks for the Emerging 5G Era

Steve Durbin expands upon the risks, not only to individuals and businesses, but also to nations as 5G technologies transform communications.

published 29 - April - 2022
Read More
Risk

Five Proactive Steps CISOs Can Take During Times of Instability

Steve Durbin outlines how CISOs can shift from being reactive to proactive, improving the overall resilience of their organisation.

published 22 - April - 2022
Read More
Risk

5 Levers Lawmakers Can Use to Tackle Cybercrime

Steve Durbin breaks down each element of the cybersecurity framework presented in the recently released report led by the ISF with CC-Driver.

published 11 - April - 2022
Read More
Security Middle East

The Importance of Effective Cyber Risk Management

Dan Norman looks at what needs to be considered when evaluating the risks involved in an organisation’s security strategy.

published 07 - April - 2022
Read More
Computer Weekly

Revised Scope of UK Security Strategy Reflects Digitised Society

The omission of the word ‘security’ from the title of the UK government’s new National Cyber Strategy is a telling one.

published 25 - March - 2022
Read More
Forbes

Four Major Cyber Risks in an Era of Tech Dominance

Read as Steve explores the technological risks that may lead to crises in the next decade in his latest article for Forbes.

published 16 - March - 2022
Read More
Computer Weekly

Security Think Tank: Good training is all about context

Emma Bickerstaffe explores what makes a good security training programme and questions buyers should ask when procuring training as a service.

published 04 - March - 2022
Read More
Security Middle East

Positively Influencing Security Behaviour

Daniel Norman, ISF Senior Solutions Analyst, takes a closer look at 'Human-Centred Security' and how to achieve it.

published 23 - February - 2022
Read More
Security Middle East

How to Secure a Smart City

Dan Norman discusses the security challenges ahead with the continued shift to smart cities becoming an attractive target for cyber attackers.

published 07 - February - 2022
Read More
Forbes

Confronting Pervasive Cyber Threats for 2022 and Beyond

Discussing key pervasive cyber threats for 2022, Steve Durbin's recent Forbes article presents a strong foundation for security teams.

published 24 - January - 2022
Read More
Ransomware

The Six Best Practices to Prevent Ransomware Infection

Read Steve Durbin's latest article addressing the most common ransomware attack techniques whilst offering guidance on their prevention.

published 21 - January - 2022
Read More
Security Magazine

10 Cognitive Biases that can Derail Cybersecurity Programs

Read Steve Durbin's latest article highlighting the impact of the unconscious mind upon cybersecurity vulnerabilities.

published 17 - January - 2022
Read More
Technology

Is the IT Sector Beset by Fear-Mongering?

Paul Watts features in this Computer Weekly article aimed at helping security professionals lead with knowledge, rather than react with fear.

published 22 - December - 2021
Read More
Computer Weekly

Security Think Tank: Reframing CISO-boardroom relations

Read Emma Bickerstaffe's latest article for Computer Weekly as she offers CISO's food-for-thought following the pandemic.

published 20 - December - 2021
Read More
Other

"log4j 2" - a perfect way to ruin a security professional's weekend

By now Members will be very familiar with the concern around the 'log4j 2' remote code execution vulnerability; Apache's java-based logger library also known as 'Log4Shell'. This vulnerability is filed as CVE-2021-44228 in the NIST National Vulnerability Database.

published 16 - December - 2021
Read More
Forbes

Zero Trust: Five Misconceptions Every Business Should Avoid

Cybercrime is a major threat to every industry and organization in the world. No wonder global entities are desperately seeking a silver bullet that can somehow neutralize cybersecurity threats.

published 06 - December - 2021
Read More
Computer Weekly

Dissecting the true value of SASE is a challenge

As a relatively nascent technology that is getting a lot of publicity, dissecting the true…

published 01 - December - 2021
Read More
Other

Maritime Cyber Security: A Global Challenge Tackled through Distinct Regional Approaches

Maritime cyber security is an emerging issue that requires immediate attention, according to the International Maritime Organization (IMO). Feedback received from global shipping professionals indicate that a common threat to the industry, such as cyber security, is dealt with differently among industry practitioners around the globe.

published 30 - November - 2021
Read More
Ransomware

Why Does Ransomware Still Work?

Paul Watts, distinguished analyst, contributes to how ransomware has managed to retain its high profile in cybercrime for Computer Weekly.

published 30 - November - 2021
Read More
DarkReading

Zero Trust: An Answer to the Ransomware Menace?

By Steve Durbin, Chief Executive of the ISF. Zero trust isn't a silver bullet, but…

published 22 - November - 2021
Read More
WSJ

Federal Cybersecurity Directive Spotlights Aging Computer Systems

Chronis Kapalidis, Principal at the ISF featured in WSJ. Many of the cybersecurity gaps outlined…

published 09 - November - 2021
Read More
Other

Is cyber insurance a worthwhile investment?

Here are five questions to help determine if your company needs cyber coverage. The cyber…

published 02 - November - 2021
Read More
Forbes

Understanding And Responding To Ransomware Threats

To pay or not to pay? Notwithstanding the ethical and emerging federal legal liability issues…

published 27 - October - 2021
Read More
Ransomware

Demystifying zero trust and how it helps with ransomware

Zero trust is a strategy organisations will need to look at implementing in the same…

published 15 - October - 2021
Read More
Security Magazine

Prepare, respond, resume

Dan Norman, senior solutions analyst at the Information Security Forum, guides us through the key…

published 07 - October - 2021
Read More
Technology

Embracing vulnerability management for the greater good

It is important to recognise that although setting out a policy and process for RD…

published 04 - October - 2021
Read More
Other

The next wave of cyberattacks will have 5G to thank

Given the high stakes, security should be at the forefront of 5G rollout plans At…

published 04 - October - 2021
Read More
Computer Weekly

Giant Group cyber attack prompts renewed calls for statutory regulation of umbrella companies

The speed of the outage and the protracted nature of the recovery bears all of…

published 01 - October - 2021
Read More
Forbes

Artificial Intelligence: The Future Of Cybersecurity?

The number of devices and associated challenges are far too many. IIoT devices possess limited…

published 23 - September - 2021
Read More
Computer Weekly

A response to planned data protection changes

As the UK chases a Brexit dividend to open up non-EU markets to UK businesses…

published 07 - September - 2021
Read More
Other

An Effective Supply Chain Starts With Security

For more advanced, sophisticated supply chains, it’s about continually going back over it to increase…

published 06 - September - 2021
Read More
Other

How criminals use artificial intelligence to fuel cyber-attacks

AI systems and can be entrenched by programmers or specific data sets. Unfortunately, if this…

published 01 - September - 2021
Read More
Other

What CISOs need to know about Wi-Fi 6E

Until now, there were limitations on some of the heavier network related devices like virtual…

published 24 - August - 2021
Read More
Other

What are the risks associated with personal, unsanctioned apps on corporate devices and why?

From a security perspective, what are the personal apps/app types that you think CISOs should…

published 24 - August - 2021
Read More
Other

Commercial Shipping Is the Next Cybersecurity Challenge

there is a misbelief that ships are not vulnerable to cyber incidents, leading to an…

published 17 - August - 2021
Read More
Forbes

Are 5G Networks Setting The Stage For A New Wave Of Cyberattacks?

...the sheer volume and velocity of 5G networks, combined with the complex infrastructure and heavy…

published 11 - August - 2021
Read More
Security Magazine

The transport threat

Ransomware will proliferate over the coming years, with attackers locking individuals into, or out of,…

published 29 - July - 2021
Read More
Other

Adapting InfoSec for Container Security

Containerization has effectively become the new normal for expediting app delivery and improvements; security concerns…

published 27 - July - 2021
Read More
Other

NCSC head champions UK-Israeli cyber relationship amid spyware accusations

Organisations often have the best of intentions when creating some of these types of software,…

published 26 - July - 2021
Read More
Computer Weekly

A return to the office is not a return to normal

Perhaps the biggest change that CISOs need to accept is that hybrid working is how…

published 20 - July - 2021
Read More
DarkReading

The Trouble With Automated Cybersecurity Defenses

Speed and accuracy in identifying and responding to threats are the alluring promises of automated…

published 13 - July - 2021
Read More
Forbes

Questions To Ask To Help You Prepare For A Cyberattack

Develop a holistic backup strategy that covers all systems and core infrastructure services. Steve Durbin,…

published 23 - June - 2021
Read More
Security Magazine

Top 5 cybersecurity challenges in the hybrid office

The pandemic has caused a tectonic shift in how we live and work. Many companies…

published 18 - June - 2021
Read More
Other

How a Security Architecture Can Keep Your Organization Upright Amid Future Upheaval

By Steve Durbin, Chief Executive of the ISF As organizations claw their way back from…

published 18 - June - 2021
Read More
Computer Weekly

Time to accept printers will leak data

Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses…

published 14 - June - 2021
Read More
Other

Designing and Building a Security Architecture

Ultimately, a well-designed security architecture will enhance understanding, simplify decision-making, improve efficiency and contain costs.…

published 10 - June - 2021
Read More
Security Magazine

Watch this space

Satellites support so much of our business infrastructure, but being in space doesn't make them…

published 02 - June - 2021
Read More
Forbes

Ransomware Is Everywhere — Here’s What You Need To Consider

Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the…

published 01 - June - 2021
Read More
Other

What the FLoC? Everything you need to know about Google’s new ad tech that aims to replace third-party cookies

First party cookies are really useful. For instance, they mean you don’t have to log…

published 19 - May - 2021
Read More
Computer Weekly

The case for vaccine passports: the real world versus the digital world

Distinguished Analyst Andy Jones and Senior Analyst Alex Jordan, both of the ISF, take opposing…

published 11 - May - 2021
Read More
Forbes

Threat Horizon 2023: Four Evolving Threats That Should Be On Your Radar

The mass migration of people out of the workplace and into the home prompted a sharp rise in cybersecurity incidents.

published 30 - April - 2021
Read More
Forbes

The Challenge Of Continuous Assurance For Supply Chains

Building resilience and agility into a supply chain to cope with fluctuations in demand and meet business goals is a major challenge.

published 19 - April - 2021
Read More
DarkReading

6 Tips for Managing Operational Risk in a Downturn

By Steve Durbin, Chief Executive of the ISF Coping with heightened operational risk during a…

published 16 - April - 2021
Read More
Security Magazine

How Cyber Security Criminals Exploit the 'Accidental Insider'

In the first of his regular new information security columns for Security Middle East, Daniel…

published 14 - April - 2021
Read More
Array
Other

Eurasia Risks 2021 - Global Cyber Crisis

The first nation state to develop technologies such as AI, 5G, robotics and quantum computing…

published 12 - April - 2021
Read More
Other

Eurasia Risks 2021 - Digital Totalitarianism

Highly connected ecosystems of digital devices will enable the harvest, repurpose and sale of sensitive…

published 12 - April - 2021
Read More
Other

The new reality of a world online

Interview with Steve Durbin, Chief Executive of the ISF and The European  The combination of…

published 06 - April - 2021
Read More
Forbes

How To Develop A Human-Centered Security Program

While many organizations have a security awareness training program in place, few trigger real behavior change or...

published 25 - March - 2021
Read More
Other

How Retailers Can Tackle Supply Chain Data Risk

By Steve Durbin, Chief Executive of the ISF Make security a core consideration in procurement…

published 16 - March - 2021
Read More
Forbes

Technology Is Just A Tool: Why People Are The Heart Of Everything We Do In Business

The idea that technology can solve all our problems is seductive. It seems like every product vendor claims to...

published 01 - March - 2021
Read More
Computer Weekly

Security Think Tank: Towards a united state of security

By Jordon Kelly, Research Analyst at the ISF Of his new national security appointments, president…

published 17 - February - 2021
Read More
Other

Three Steps to Securing Supply Chains Under Pressure

By Steve Durbin, Chief Executive of the ISF  You need to establish continuous monitoring across…

published 15 - February - 2021
Read More
Forbes

Eight Cyber Challenges In An Uncertain World

With the pandemic precipitating a health crisis that continues to threaten the global economy and the real possibility of a...

published 10 - February - 2021
Read More
Forbes

Six Ways A Good Leader Can Become A Great Leader

Many people can become good leaders. After all, you can learn how to communicate and how to be a better listener; you can...

published 09 - February - 2021
Read More
InfoSecurity

Cybercrime to Scale New Heights in 2021: What Can You do About it?

By Steve Durbin, Chief Executive of the ISF With the pandemic precipitating a rapid acceleration…

published 08 - February - 2021
Read More
SC Media

Words of advice for President Biden’s new CISO

By Steve Durbin, Chief Executive of the ISF Cybersecurity should sit at the core of…

published 04 - February - 2021
Read More
Computer Weekly

Security Think Tank: Time to rethink stopgap solutions

By Paul Holland, Principle Research Analyst at the ISF Home working assumes a certain level…

published 26 - January - 2021
Read More
SC Media

Look for GDPR fines to increase, extend beyond breaches

organizations should in particular note the extent of fines levied by regulators for infringements that…

published 25 - January - 2021
Read More
Forbes

Five Threat Vectors Destined To Make Waves In 2021

By Steve Durbin, CEO of the Information Security Forum, and Forbes Business Council Member Building…

published 20 - January - 2021
Read More
Other

New Year’s Resolutions for the Board in 2021

By Steve Durbin, CEO of the ISF Maturing your organization’s ability to detect intrusions quickly…

published 13 - January - 2021
Read More
Other

AI’s Two Achilles’ Heels Keep Me Up at Night

All the social techniques cybercriminals currently employ could be improved immeasurably with the help of…

published 11 - January - 2021
Read More
InfoSecurity

Where to Focus Security Resources Mid- and Post-Pandemic

By Steve Durbin, CEO of the ISF Business leaders will inevitably need to make difficult…

published 08 - January - 2021
Read More
Other

Cybersecurity Must Be the Top Priority for the Board in 2021

By Steve Durbin, CEO of the ISF Leading the enterprise to a position of readiness,…

published 07 - January - 2021
Read More
DarkReading

10 Benefits of Running Cybersecurity Exercises

By Steve Durbin, Managing Director of the ISF. There may be no better way to…

published 06 - January - 2021
Read More
Other

2020 Work-for-Home Shift: What We Learned

One area that organizations need to deal with is the rise of the insider threat,…

published 05 - January - 2021
Read More
SC Media

Privacy 2020: From Prepared to Alarmed, the Year the Rubber Hit the Road

With 2020 coming to a close, SC Media is delivering through a series of articles…

published 04 - January - 2021
Read More
DICE

Cybersecurity in 2021: 5 Trends Security Pros Need to Know

The insider threat is one of the greatest drivers of security risks that organizations face…

published 21 - December - 2020
Read More
Other

ISF Proposal for “Human-Centered Security” Focuses Security Awareness on People’s Interactions With Technology

How can security keep pace with a cyber threat landscape that rapidly becomes more sophisticated…

published 18 - December - 2020
Read More
BetaNews

Practical tips and advice for personal IoT security

By Daniel Norman, Senior Solutions Analyst at the ISF A large portion of IoT-related breaches…

published 18 - December - 2020
Read More
Security Magazine

Top Global Security Threats Organizations Will Face in 2021

Attackers will continue to be presented with the tools and opportunities to target and exploit…

published 17 - December - 2020
Read More
SC Media

Ransomware attacks target backup systems, compromising the company ‘insurance policy’

The success of ransomware is reliant on whether or not the target organization has patched…

published 16 - December - 2020
Read More
Forbes

Eight Steps To Building A Human-Centered Security Culture

By Steve Durbin, Managing Director, Information Security Forum, and Forbes Business Council Member Ransomware, phishing,…

published 15 - December - 2020
Read More
Threatpost

Conti Gang Hits IoT Chipmaker Advantech with $14M Ransom Demand

Payment of a ransom is also a contentious discussion – in many cases the ransom…

published 11 - December - 2020
Read More
Security Magazine

New Information Security Forum Research Explores Human-Centered Security

Technology and processes should complement behavior, not add friction and impede productivity... Steve Durbin, Managing…

published 07 - December - 2020
Read More
SC Media

Websites Requiring Security Software Downloads Opened Door to Supply Chain Attack

I, for one, am wary if a website asks me, unprompted, to download anything. It…

published 07 - December - 2020
Read More
Security Magazine

CISA Warns Public About Online Holiday Shopping Scams

Also, beware of email “offers” from companies you don’t recognize and even those that you…

published 04 - December - 2020
Read More
Threatpost

Changing Employee Security Behavior Takes More Than Simple Awareness

A human-centered security program helps organizations to understand their people and carefully craft initiatives that…

published 03 - December - 2020
Read More
DarkReading

Why Security Awareness Training Should Be Backed by Security by Design

As a starting point, an individual will always choose to be productive in their current…

published 02 - December - 2020
Read More
Other

Information Security Forum Research Dives Into the Need for Human-Centered Security

A typical strategy should aim to reduce the number of security incidents and improve the…

published 01 - December - 2020
Read More

Information Security Forum Addresses Global Security Issues at 31st Annual World Congress

The Information Security Forum (ISF), the trusted source that senior security professionals and board members…

published 30 - November - 2020
Read More
BetaNews

Human-Centred Approach is Key to Better Security

Errors and acts of negligence can cause significant financial and reputational damage to an organization,…

published 27 - November - 2020
Read More
InfoSecurity

Organizations Should Use Psychology to Promote Secure Behavior Among Staff

Errors and acts of negligence can cause significant financial and reputational damage to an organization...…

published 27 - November - 2020
Read More
Other

Qbot Banking Trojan Now Deploying Egregor Ransomware

Organizations should have an incident response or crisis management plan for ransomware events, knowing who…

published 26 - November - 2020
Read More
Other

Cybersecurity Workforce Study Needs to be Taken with a Pinch of Salt

Apprenticeships, on the job learning, backed up with support training packages are the way to…

published 25 - November - 2020
Read More
DICE

Remote Work in 2021: Cybersecurity Grows in Importance

The global COVID-19 pandemic has forced digital change on organizations at high speed and certainly…

published 23 - November - 2020
Read More
Threatpost

Apple to Deliver ‘Privacy Labels’ for Apps, Revealing Data-Sharing Details

Just as consumers now automatically accept cookies and agree to privacy policies, they may also…

published 20 - November - 2020
Read More
Security Magazine

CISA: Ransomware Activity Targeting the Healthcare and Public Health Sector

Privacy should also be a high priority for anyone handling sensitive information, considering the shift…

published 19 - November - 2020
Read More
Other

Imminent Cyberthreat Could Disrupt Hundreds of US Healthcare Systems

Basic cyber hygiene standards need to be met, covering patching and updates, network segmentation, network…

published 16 - November - 2020
Read More
DarkReading

6 Cybersecurity Lessons From 2020

The [pandemic] accelerated and concentrated forces, such as the move to remote working and adoption…

published 16 - November - 2020
Read More
Other

Skills Shortage Rains on Cloud Advances

Cross training within an organization is a good method of closing the skills gap by…

published 16 - November - 2020
Read More
Other

FBI: Hospitals and Healthcare Providers Face Imminent Ransomware Threat

The healthcare services have an outdated approach to security awareness, education, and training... Daniel Norman,…

published 11 - November - 2020
Read More
DICE

What Skills Will Cybersecurity Leaders Want in 2021?

All infosec teams have been under huge pressure lately and good CISOs acknowledge that and…

published 10 - November - 2020
Read More
InfoSecurity

Trust in Remote Working Tools Declines as Need for Security Increases

...overdependency on untested technologies, new vulnerabilities in systems, poorly constructed policies and a lack of…

published 06 - November - 2020
Read More
Forbes

Three Common Digital Transformation Challenges — And How To Overcome Them

By Steve Durbin, Managing Director of the ISF and Forbes Business Council Member Once expectations are…

published 05 - November - 2020
Read More
Other

Why ransomware has become such a huge problem for businesses

Anyone with access to the Dark Web can buy readily available ransomware kits for less than $100.…

published 04 - November - 2020
Read More
Security Magazine

Carnival ransomware attack affected three brands

Creating a cyber-savvy workforce that takes information security seriously, while nurturing a culture of trust,…

published 03 - November - 2020
Read More
Other

What Can Businesses Learn from the Cyber Security Challenges of Coronavirus

As we come out of lockdown and start to negotiate the economic fallout it has…

published 02 - November - 2020
Read More
Other

Norway Alleges Russia Orchestrated Parliament Email Hack

The attacking state will build user profiles, understand patterns of behavior and then they will…

published 30 - October - 2020
Read More
Other

Why Organizations Should Be Wary of the Security Risks Posed by Augmented Reality

By Steve Durbin, Managing Director of the ISF AR promises much, but organizations will soon…

published 29 - October - 2020
Read More
Other

ISF Supports Cyber and Compliance Challenges with Launch of Aligned Tools Suite 2020

We live in an uncertain world where budgets and resources are tight, yet the need…

published 28 - October - 2020
Read More
InfoSecurity

#NCSAM: How Can Consumers Boost the Security of IoT Devices?

...individuals should proactively try and seek out vulnerability forums online and regularly assess whether exploits…

published 27 - October - 2020
Read More
DICE

Cybersecurity, Cloud Skills: Key to Companies’ Digital Transformation

Increasingly, lockdown has driven us all online and the training industry has been somewhat slow…

published 26 - October - 2020
Read More
Other

How the Enterprise Can Shut Down Cyber Criminals and Protect a Remote Staff

Non-security incidents can have a substantial knock-on effect within the information security spectrum Steve Durbin,…

published 22 - October - 2020
Read More
BetaNews

How to Enhance Security Education, Training and Awareness for Employees

By Daniel Norman, Senior Solutions Analyst at the Information Security Forum. Frequently delivering micro-content, using…

published 21 - October - 2020
Read More
Security Magazine

65% of leaders say that security awareness training is not a top priority

The best security policies are under constant review and take into account ongoing feedback. Archaic…

published 19 - October - 2020
Read More
Other

Research Reveals Gaps in Cybersecurity Training Initiatives Within Remote Workforce

By helping staff understand how vulnerabilities can lead to poor decision making and errors, organizations…

published 19 - October - 2020
Read More
Security Magazine

Six core characteristics that next-generation CISO’s exhibit

Being a next-generation CISO is an extremely rewarding position that allows an individual to become…

published 16 - October - 2020
Read More
Security Magazine

UHS Hospitals hit by Ryuk ransomware, forced to shut down systems

Attackers will once again turn their attention to disrupting the health service by targeting poorly…

published 15 - October - 2020
Read More
Other

Cyber Experts Weigh-In: Universal Health Services Hospital System Ransomware Attack

This is an exciting time for the healthcare industry but it is also dangerous. As…

published 14 - October - 2020
Read More
Forbes

How Criminals Use Artificial Intelligence To Fuel Cyber Attacks

By Steve Durbin, Managing Director of the Information Security Forum, and Forbes Business Council Member…

published 14 - October - 2020
Read More
InfoSecurity

Research: Cloud Skills and Solutions Are in Short Supply

Shortages in skills and capabilities are being revealed as major security incidents damage organizational performance…

published 13 - October - 2020
Read More
InfoSecurity

Suspected Ransomware Takes Out Major US Healthcare Provider

Privacy should also be a high priority for anyone handling sensitive information, considering the shift…

published 12 - October - 2020
Read More
Threatpost

Ring’s Flying In-Home Camera Drone Escalates Privacy Worries

 Smart home devices, such as Ring, collect an inordinate amount of sensitive personal data in…

published 08 - October - 2020
Read More
Other

Insider vs. Outsider Data Security Threats: What’s the Greater Risk?

As data breaches increase, many will be the result of Insider threats. In fact, the…

published 06 - October - 2020
Read More
Threatpost

Georgia Election Data Hit in Ransomware Attack

Typically, the success of ransomware is reliant on whether or not the target organization has…

published 03 - October - 2020
Read More
InfoSecurity

ISF Outlines the Key Skillsets of Modern CISOs

As digital transformation drives organizations to become more agile and responsive, the CISO faces demands…

published 02 - October - 2020
Read More
Other

Cuts to Digital Security Spending Right Now Would Be a Big Mistake

By Steve Durbin, Managing Director, Information Security Forum As we head into Cybersecurity Awareness Month…

published 01 - October - 2020
Read More
BetaNews

What does it take to be a next generation CISO?

Becoming a next-generation CISO requires an individual to embrace and master new skills and disciplines,…

published 30 - September - 2020
Read More
Forbes

Six Skills CISOs Should Pursue To Elevate Their Role

By Steve Durbin, Managing Director, Information Security Forum, and Forbes Business Council Member A rapid…

published 29 - September - 2020
Read More
Computer Weekly

Security Think Tank: Beware security blind spots at the edge

That datacentre security is a complex subject is not in doubt and, given the trend…

published 21 - September - 2020
Read More
Other

Threats from the digital world lead to greater cyber security concerns

Organizations will have to adapt quickly to survive when digital and physical worlds collide. By…

published 21 - September - 2020
Read More
Security Magazine

Tesla and FBI thwart $1 million Russian Ransomware hack

“Ransomware is one of the most prevalent threats to an organization’s information and is more…

published 02 - September - 2020
Read More
DICE

Why the Cybersecurity Skills Gap Continues to Widen

“In today’s COVID-19 reality, to rectify the continued cyber skills shortage, organizations are being encouraged…

published 25 - August - 2020
Read More
Other

Ransomware Attack Hits Carnival Cruise Corporation: What We Know

"Ransomware attackers are not interested in stealing assets and using them to cause damage, but…

published 20 - August - 2020
Read More
Forbes

5G Brings Benefits, But Also Heralds Fresh Security Threats

By Steve Durbin, Managing Director, ISF and Forbes Business Council Member The continuing rollout of…

published 19 - August - 2020
Read More
DICE

Your Work-From-Home Future: Now’s the Time to Think About Security

“Employees subject to new working arrangements may well react maliciously due to limited hours, lowered compensation,…

published 18 - August - 2020
Read More
Threatpost

Cybersecurity Skills Gap Worsens, Fueled by Lack of Career Development

“Increasingly, lockdown has driven us all online and the training industry has been somewhat slow…

published 17 - August - 2020
Read More
DarkReading

Why Data Ethics Is a Growing CISO Priority

With data collection growing, and increased concern about how it is handled, a synergy between…

published 11 - August - 2020
Read More
DarkReading

The Future's Biggest Cybercrime Threat May Already Be Here

By Steve Durbin, Managing Director, ISF Current attacks will continue to be refined, and what…

published 04 - August - 2020
Read More
Forbes

How To Prepare Your Business As Worldwide Recession Looms

By Steve Durbin, Managing Director, ISF and Forbes Business Council Member The business world is…

published 27 - July - 2020
Read More
Other

The Internet Of Forgotten Things Will Leave A Dangerous Legacy

By Steve Durbin, Managing Director, ISF The Internet of Things (IoT) infrastructure will soon become…

published 24 - July - 2020
Read More
DarkReading

Quantifying Cyber Risk: Why You Must & Where to Start

"The challenge for security is to be able to translate security metrics into a form…

published 22 - July - 2020
Read More
Computer Weekly

Security Think Tank: Balancing human oversight with AI autonomy

Artificial intelligence and machine learning techniques are said to hold great promise in security, enabling…

published 22 - July - 2020
Read More
Other

On the Cybersecurity Horizon: Digital and Physical Worlds Set to Collide

By Steve Durbin, Managing Director, ISF The digital and physical worlds are on an irreversible…

published 21 - July - 2020
Read More
SC Media

EU court kills Privacy Shield, wreaks havoc on digital economy

Schrems II “Was always going to be a major test for the Privacy Shield,”  Steve…

published 17 - July - 2020
Read More
Security Magazine

Deepfakes will tell true lies

By Steve Durbin, Managing Director, ISF In the coming years, advanced deepfakes of high-profile individuals…

published 14 - July - 2020
Read More
InfoSecurity

The Digital Generation Will Become the Cyber-Criminal’s Dream

By Steve Durbin, Managing Director, ISF Over the next few years, the first truly digital…

published 03 - July - 2020
Read More
Computer Weekly

Security Think Tank: ‘Shift left’ to secure containers

Adopting containers promises great organisational efficiency advantages, but the fast-evolving technology can be problematic for…

published 01 - July - 2020
Read More
DICE

Cybersecurity Budgets: Will They Survive COVID-19?

“Security leaders will need to adapt, swiftly, to speaking the language of the business in…

published 30 - June - 2020
Read More
Other

Open Source Security Issues Exist: Deal With Them, Report Urges

Open Source Software is becoming much more commonplace within organizations, bringing a different set of…

published 29 - June - 2020
Read More
Other

COVID19, Cybersecurity and the Healthcare Industry

By Daniel Norman, Research Analyst, ISF The healthcare industry has been under immense pressure during…

published 29 - June - 2020
Read More
Other

Cybersecurity 2020: challenges and threats to be aware of

The risk and severity of cyber-attacks have increased over the past few years. In recent…

published 23 - June - 2020
Read More
BetaNews

Extreme weather will inflict chaos on infrastructure

In the coming years, extreme weather events will become more frequent and widespread, devastating areas…

published 22 - June - 2020
Read More
Forbes

Having Cash Flow Problems? 15 Areas To Investigate

Businesses that may be feeling the pinch concerning their income might start by finding ways…

published 19 - June - 2020
Read More
Other

Behavioral Analytics Expected to Trigger a Consumer Backlash

"Organizations whose business model is dependent on behavioral analytics will be forced to backtrack on…

published 12 - June - 2020
Read More
Forbes

Promoting A Culture Of Adaptability: 16 Effective Tips For Businesses

Business leaders are aware of how important it is to be adaptable to survive market…

published 12 - June - 2020
Read More
Other

Augmented Attacks Expected to Distort Reality

In the coming years, new technologies will further invade every element of daily life with…

published 11 - June - 2020
Read More
DICE

COVID-19: Rethinking Cybersecurity in a Post-Pandemic World

It’s been four months since COVID-19 was declared a global pandemic by the World Health Organization (WHO).…

published 04 - June - 2020
Read More
Other

The internet of forgotten things will bite back

In the coming years, internet of things (IoT) infrastructure will become unmanageable and impossible to…

published 29 - May - 2020
Read More
Security Magazine

70% of Organizations to Increase Cybersecurity Spending Following COVID-19 Pandemic

With coronavirus crisis creating new opportunities for cybercriminals, 70 percent of organizations are seeing the…

published 27 - May - 2020
Read More
Other

Robo-helpers will soon help themselves to data

Poorly secured robo-helpers will be weaponised by attackers. By Steve Durbin, Managing Director, ISF Over…

published 21 - May - 2020
Read More
Threatpost

Leaked NHS Docs Reveal Roadmap, Concerns Around Contact-Tracing App

Future features include plenty of self-reporting options, and officials’ fears the data could be misused.…

published 20 - May - 2020
Read More
Other

Cybersecurity Threats to the Food Supply Chain

When Smithfield Foods closed its Sioux Falls pork processing plant – joining other meat and…

published 18 - May - 2020
Read More
Computer Weekly

Security Think Tank: Create healthy habits to avoid burnout

Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working…

published 14 - May - 2020
Read More
Other

Remote work: 6 common misunderstandings about online security threats

VPN, cloud, and phishing misunderstandings show up in myths about security and remote work. Security…

published 13 - May - 2020
Read More
Security Magazine

Information Security Forum Releases Updated Guide to Security Best Practices

The Information Security Forum (ISF) has published a major update to its Standard of Good Practice (The…

published 11 - May - 2020
Read More
Security Magazine

Vishing and Cybercriminals during COVID-19

The COVID-19 pandemic has resulted in an upshot of all types of scams. In the…

published 05 - May - 2020
Read More
Other

Understanding the CFO’s Cybersecurity Role in the Age of COVID-19

Senior executives understand that today’s global economy is still not adequately protected against cyberattacks, despite…

published 04 - May - 2020
Read More
SC Media

Google, Apple tighten protections on contact tracing; Americans worry over privacy

As the likes of Google and Apple bolster privacy in the race to come up…

published 01 - May - 2020
Read More
Other

The Impact of Coronavirus on the Threat Landscape

How has the coronavirus impacted the outlook on security over the next few years? The…

published 28 - April - 2020
Read More
SC Media

Connecticut town drops drone program to combat COVID-19 spread over privacy concerns

“Like other Internet of Things (IoT) devices, drones currently have very poor security controls, making…

published 28 - April - 2020
Read More
DarkReading

Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022

Researchers outline cybersecurity threats they predict businesses will face in two years as technology evolves.…

published 23 - April - 2020
Read More
Security Magazine

Risk Management, Insider Threats and Security Leaders in the Age of COVID-19

An insider threat is a security risk that originates from within an organization. According to…

published 22 - April - 2020
Read More
InfoSecurity

The Privacy-Security Balance in Digital Surveillance: Lessons from COVID-19

A major feature of the current COVID-19 crisis has been the sudden growth of state…

published 21 - April - 2020
Read More
Security Magazine

Information Security Forum: Nine Cybersecurity Threats Organizations can Expect Through 2022

The Information Security Forum (ISF) has released Threat Horizon 2022, the latest in a series of…

published 20 - April - 2020
Read More
Other

IoT security, neglected infrastructure, and a crisis of trust deemed major threats for 2022

The Information Security Forum predicts the coming threats with a very good track record so…

published 16 - April - 2020
Read More
DarkReading

When All Behavior Is Abnormal, How Do We Detect Anomalies?

Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects…

published 15 - April - 2020
Read More
InfoSecurity

If Remote Working is the New Norm, How Do We Do it Securely?

“My biggest concern is when remote workers enter phase three since it is unlikely that…

published 14 - April - 2020
Read More
Other

FBI: COVID-19-Themed Business Email Compromise Scams Surge

"Criminals have become more sophisticated by considering the psychological aspects of an attack," says Mark…

published 08 - April - 2020
Read More
Security Magazine

Nearly 10 Million People Filed for Unemployment in the US: What Does It Mean for the Cybersecurity and IT Workforce?

The number of new people claiming unemployment benefits totaled a staggering 6.648 million last week…

published 06 - April - 2020
Read More
Threatpost

Covid-19 Poll Results: One in Four Prioritize Health Over Privacy

“Ultimately we are being asked to trust our governments in their ability to handle personal…

published 01 - April - 2020
Read More
InfoSecurity

The Long-Term Impact of #COVID19 on the Cybersecurity Industry

“Remote working and remote business interactions will identify new opportunities, new ways of working that…

published 31 - March - 2020
Read More
Other

Impact of Coronavirus Outbreak on Early Stage Venture Investment in Cybersecurity

“I suspect that COVID-19 will tighten further the investment criteria being applied with a keener…

published 26 - March - 2020
Read More
InfoSecurity

The Short-Term Impact of #COVID19 on the Cybersecurity Industry

As we work remotely and isolate ourselves from friends and colleagues as best we can,…

published 26 - March - 2020
Read More
Other

As coronavirus spreads, cybersecurity staff contend with increasing attacks, remote workers

As the COVID-19 pandemic continues to spread, cybersecurity professionals have never been busier. Despite some reports of cybercriminals…

published 24 - March - 2020
Read More
Other

15 Coronavirus Online Scams to Watch Out For

“Our appetite for information is vast and cybercriminals know this so there may be attachments…

published 23 - March - 2020
Read More
Threatpost

Covid-19 Spurs Facial Recognition Tracking, Privacy Fears

The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues…

published 20 - March - 2020
Read More
Computer Weekly

Security Think Tank: To tackle Covid-19, be prepared, flexible and resilient

In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of…

published 18 - March - 2020
Read More
Security Magazine

European Electricity Association Confirms Hackers Breached its Office Network

ENTSO-E, the European Network of Transmission System Operators, has announced that it found evidence of…

published 17 - March - 2020
Read More
DarkReading

Keys to Hiring Cybersecurity Pros When Certification Can't Help

There just aren't enough certified cybersecurity pros to go around -- and there likely never…

published 16 - March - 2020
Read More
InfoSecurity

Infosecurity Magazine Q&A: Steve Durbin

Steve Durbin is a senior security leader at the Information Security Forum (ISF) with a diverse background…

published 16 - March - 2020
Read More
Other

ISF Coronavirus (COVID-19) Update

10th March 2020 ISF Coronavirus Update With the growing concerns regarding the Coronavirus (COVID-19) outbreak…

published 10 - March - 2020
Read More
Other

Use the human-centered approach for smarter security and compliance teams

By Steve Durbin, Managing Director of the Information Security Forum. As the cyberthreat landscape becomes…

published 05 - March - 2020
Read More
DICE

Insider Threats: How Co-Workers Became a Bigger Security Headache

One of the biggest security threats to your team might be the person working right…

published 03 - March - 2020
Read More
Other

Conquering the Cyber Security Challenges of The Cloud

By Steve Durbin, Managing Director, Information Security Forum Cloud computing has become a prevalent force, bringing…

published 26 - February - 2020
Read More
Security Magazine

US Sen. Gillibrand Announces Legislation to Create a Data Protection Agency

"As pressure from regulatory compliance increases, businesses must take an increasingly integrated and well-rounded approach…

published 17 - February - 2020
Read More
Other

Overcoming the Cyber Security Challenges of the Cloud

The rise in business processes supported by cloud services has been well evidenced by organizations…

published 14 - February - 2020
Read More
SC Media

Ringing in a new National Privacy Law?

Privacy advocates have long called for a federal privacy law and it’s coming…in the meantime,…

published 05 - February - 2020
Read More
Computer Weekly

Security Think Tank: Bug bounties are changing the image of hackers

The traditional picture of a hacker is of a script kiddie in a hoodie hunched…

published 03 - February - 2020
Read More
Security Magazine

Data Privacy Day 2020 Encourages Consumers to “Own Their Privacy”

The theme of Data Privacy Day 2020 is “Own Your Privacy.” Data Privacy Day began…

published 29 - January - 2020
Read More
Security Magazine

Lawmakers Introduce Bill to Reform NSA Surveillance

"This debate has been ongoing for some time now and there is clearly a need…

published 27 - January - 2020
Read More
Computer Weekly

Security Think-Tank: Tackle insider threats to achieve data-centric security

The belief that effective perimeter security is the best way to protect data is a…

published 24 - January - 2020
Read More
Other

World Economic Forum Global Risks Report Highlights Dangers of Digital innovation

"In a hyperconnected world, attack surfaces and interdependencies will grow astonishingly quickly," warns Steve Durbin,…

published 23 - January - 2020
Read More
Other

Eurasia Risks 2020: Exacerbation of the Battle for Technological Dominance

"Technological advances are not restricted to America and China. They are a global phenomenon both…

published 22 - January - 2020
Read More
Other

Five Reasons Why Supply Chain Security Must be on Your Agenda

How do you know that the critical parts inside your servers and devices are not…

published 20 - January - 2020
Read More
Other

Cybersecurity 2020: Welcome to the Digital Cold War

The race to develop strategically important next-generation technology will drive an increase in nation-state-backed attacks.…

published 13 - January - 2020
Read More
Other

The Top Three Global Cyber Security Threats for 2020

In the year ahead, organisations of all sizes must prepare for the unknown, so they…

published 13 - January - 2020
Read More
Other

Deciphering Artificial Intelligence in the Future of Information Security

Artificial Intelligence (AI) is creating a new frontline in information security. Systems that independently learn, reason and…

published 08 - January - 2020
Read More
Other

Maximise your defence with people power

Humans are often referred to as the “weakest link” in information security. However, organisations have…

published 08 - January - 2020
Read More
Other

Cybersecurity New Year’s Resolutions from the Information Security Forum

It’s that time of year again. Time for every one of us to reminisce on…

published 06 - January - 2020
Read More