In the news

Filter by
Choose a date range
Search by keyword
Help Net Security

Why data, AI, and regulations top the threat list for 2024

SF Chief Executive Steve Durbin, features in Helpnet Security to address three cyber security hurdles in 2024 - Data, AI and Regulation.

published 21 - December - 2023
Read More
Dark Reading

EU Tightens Cyber Security Requirements for Critical Infrastructure and Services

Organizations in "essential" sectors have until October 2024 to comply with the Network and Information…

published 15 - November - 2023
Read More
Forbes

Five Ways Security Teams Can Strengthen Business Relationships

Recent global events such as the pandemic have allowed security leaders to showcase the potential…

published 13 - November - 2023
Read More
Cybersecurity Insiders

Navigating Security, Business Continuity, Through a Downturn

With inflationary pressures mounting and downturn fears hovering, it’s natural for organizations to scale back on their overall…

published 07 - November - 2023
Read More
Security Info Watch

Five Ways Enterprises Can Boost Incident Preparedness

Security is not a primary area of expertise for most organizations so preparedness may fall…

published 30 - October - 2023
Read More
Manufacturing Tomorrow

The Hidden Risks of Industrial Control System manufacturers: Why ICS Environments are Vulnerable

Industrial control systems (ICS) such as programmable logic controllers, distributed controls systems, SCADA systems, and operational…

published 20 - October - 2023
Read More
InfoSecurity

Four Data Security Challenges Set to Impact Organisations in the Coming Years

Data is the most durable, limitless commodity driving future economies and offering fresh insights for…

published 25 - September - 2023
Read More
CSO Online

10 principles to ensure strong cybersecurity in agile development

The agile project management philosophy values speed, collaboration, communication, and interaction. Here are some best…

published 14 - September - 2023
Read More
Forbes

The Future Of Work Is Remote: How Organizations Can Prepare For Security Challenges

The fourth industrial revolution is here, and new technologies have the potential to change how…

published 14 - September - 2023
Read More
TechInformed

Building the cyber security workforce of today

Cyber security staffing shortages are being driven by issues such as burnout, a lack of…

published 05 - September - 2023
Read More
Forbes

Eight Steps in Managing Cyber Risk Through A Downturn

I predict that for cybersecurity leaders, 2023 will not be an easy year. On the…

published 14 - August - 2023
Read More
ISF Expert Opinion

Hack on Japanese Port Shows How Compromised Operational Technology Can Have a Widespread Impact

Paul Holland shares his thoughts on protecting and securing the integrity and confidentiality of information within OT environments.

published 17 - July - 2023
Read More
Emerging Threats

How organizations can navigate geopolitical and cyber risks in an interconnected world

Globalization and hyperconnectivity has made the world more interconnected and interdependent than ever before. The…

published 17 - July - 2023
Read More
Security Middle East

Security Middle East Conference: Chairperson’s key takeaways

The inaugural Security Middle East Conference was a major success for the security community. Over…

published 27 - June - 2023
Read More
InformationWeek

Walking the Tightrope: Navigating the risks and rewards of AI

Steve Durbin contributes to InformationWeek to chart the course for the responsible use of artificial intelligence.

published 26 - June - 2023
Read More
InfoSecurity

Infosecurity Europe: Cyber Security Industry Still Fighting to Recruit and Retain Talent

Cybersecurity teams are struggling to find the right talent, with the right skills, and to…

published 21 - June - 2023
Read More
Help Net Security

Why Organisations Should Adopt a Cloud Security Framework

Steve Durbin outlines how choosing the right cloud cyber security framework can strengthen resilience across your entire cloud supply chain.

published 09 - June - 2023
Read More
ISF Expert Opinion

COSMICENERGY: A new threat to OT

Paul Holland provides insight into a possible new threat to operational technology environments, specifically those in the energy sector.

published 02 - June - 2023
Read More
Supply Chain Brain

Navigating Supplier Risk Challenges to Shore Up Cyber Defences

Steve Durbin delves into the key challenges organisations should address in building resilience against supply chain risks.

published 02 - June - 2023
Read More
Forbes

Four Risks and Challenges of AI Democratisation for Businesses

Steve Durbin discusses the potential risks and challenges organisations could face as they increasingly build, use or rely on AI technologies.

published 26 - May - 2023
Read More
Security Middle East

Saudi Vision 2030: Digital challenges and opportunities

Dan Norman, Regional Director, EMEA for the ISF, looks at the challenges and opportunities Saudi…

published 18 - May - 2023
Read More
CSO Online

Top Risks and Best Practices for Securely Offboarding Employees

Outgoing employees pose significant security risks to organizations. Here are some of the major issues…

published 26 - April - 2023
Read More
Architecture & Governance

Invest in Developing a Human-Centred Security Program

Steve Durbin explores steps to developing a human-centred security program that engages your workforce to better protect your organisation.

published 24 - April - 2023
Read More
Security Middle East

Five Cybersecurity Trends for the Middle East in 2023

Dan Norman predicts cybersecurity trends that are set to accelerate for the Middle East in 2023.

published 31 - March - 2023
Read More
Forbes

Achieving The Five Levels Of Information Security Governance

Steve Durbin offers advice on what strategies can be taken to make information security better connected to organisational goals and strategy.

published 23 - March - 2023
Read More
TechTarget

Six Principles for Building Engaged Security Governance

Steve Durbin features in TechTarget to offer insight into engaged governance and the six principles that organisations should implement.

published 15 - March - 2023
Read More
ISF Expert Opinion

Security and the Business: It's good to talk

Paul Watts explores the shifting nature of business, the role of the security leader, and the impact of not aligning to each other’s goals.

published 09 - March - 2023
Read More
CSO Online

Measuring Cyber Security: The what, why and how

Steve Durbin explores the ways security teams can best measure, analyse and report cyber security threats and performance

published 16 - February - 2023
Read More
ISF Expert Opinion

Navigating the Politics of Measuring Security

Richard Absalom explores the soft skills needed to navigate boardroom politics, ensuring measurements support decisions and drive action.

published 15 - February - 2023
Read More
Dark Reading

Build Cyber Resiliency With These Security Threat-Mitigation Considerations

Steve Durbin offers insight into how organisations can get on the path to developing a coherent security strategy.

published 15 - February - 2023
Read More
Tanium

It Pays to Know How Your Cybersecurity Stacks Up

Paul Watts, Distinguished Analyst for the ISF featured in Tanium magazine to share his thoughts on how security professionals can demonstrate value by adopting a shift-left mentality – a proactive stance for security that allows companies to become more agile and able to innovate.

published 18 - January - 2023
Read More
Forbes

Four Cyber Risk Trends to Watch in 2023 and How Businesses Can Mitigate Them

With cyber security becoming riskier, costlier and more complicated, Steve Durbin explores four key challenges to look out for in 2023.

published 11 - January - 2023
Read More
Forbes

Six Steps to Better Counter Supply Chain Risks

As vendor risk emerges as a top security priority, Steve Durbin provides tips you can adopt today to better manage your supply chains.

published 19 - December - 2022
Read More
CSO Online

Five Top Qualities You Need to Become a Next-Gen CISO

Steve offers actionable guidelines to building and maintaining the skills and relationships that can take security leaders to the next level.

published 19 - December - 2022
Read More
Security Middle East

Threat Intelligence: Establishing a stream of trustworthy data

Dan Norman explores how you can create a steady stream of meaningful data that is actually relevant to your organisation.

published 05 - December - 2022
Read More
Computer Weekly

Security Think Tank: To stop ransomware, preparation is the best medicine

Paul Watts details what you should be focussing on when thinking about business resiliency in the context of ransomware.

published 24 - November - 2022
Read More
Spiceworks

How Cyber Threat Intelligence Provides Security and Value to Business

Steve Durbin offers his thoughts on how enterprises can make the most out of threat intelligence for smarter security.

published 23 - November - 2022
Read More
Forbes

Best Practices to Help Strengthen Your Company's Security Culture

Human behaviour is one of the biggest challenges faced by security practitioners, leaders and cyber risk managers today.

published 13 - October - 2022
Read More
Dark Reading

Seven Practical Considerations for Effective Threat Intelligence

A background to the current state of threat intelligence, and practical guidance for security teams at all stages of its implementation.

published 05 - October - 2022
Read More
TechTarget

Solve ICS Security Issues with ICS and IT Team Convergence

Threat actors are predicted to weaponise industrial control systems in order to harm or kill humans by 2025 - how should you prepare?

published 29 - September - 2022
Read More
PropertyCasualty360

The Threat of Deepfakes and Their Security Implications

Steve Durbin discusses the cyber best practices and security controls you should be implementing now to mitigate the threat of deepfakes.

published 07 - September - 2022
Read More
Forbes

Securing Industrial Control Systems: The What, Why and How

Steve Durbin featured in Forbes to shed light on the best practices you should consider to better protect ICS environments.

published 30 - August - 2022
Read More
World Economic Forum

How the Responsible Use of AI Can Create Safer Online Spaces

Steve Durbin offers recommendations for organisations to mitigate the potential risks and manage the ethical adoption of AI.

published 16 - August - 2022
Read More
Forbes

Organisations Cannot Prosper Without Trust: Five ways to boost trust with cyber security

Steve Durbin offers advice on how you can prevent the dilution of enterprise value and trust in the eyes of your stakeholders.

published 04 - August - 2022
Read More
CSO Online

Five Trends Making Cyber Security Threats Riskier and More Expensive

As risks increase with the world becoming more digital, regulated, and interconnected, Steve Durbin offers steps to reduce their impact.

published 27 - July - 2022
Read More
Computer Weekly

Cyber Insurance: An effective use of your scant security budget?

Paul Watts questions whether cyber insurance is a must-have item, an expensive luxury, or the emperor’s new clothes.

published 21 - July - 2022
Read More
Dark Reading

Three Cyber Threats Resulting from Today's Technology Choices to Hit Businesses by 2024

Steve Durbin features in Dark Reading to discuss three major cyber threats that could result from today's hasty technology decisions.

published 13 - July - 2022
Read More
Computer Weekly

Security Think Tank:
Balanced approach can detangle supply chain complexity

Francesca Williamson shares insight on how you can detangle the complexities of the supply chain and create better security practices.

published 08 - July - 2022
Read More
TechTarget

Three Threats Dirty Data Poses to the Enterprise

Steve Durbin discusses three dirty data cyber security concerns, and how organisations can protect themselves against these emerging threats.

published 06 - July - 2022
Read More
Forbes

Ignoring Cyber Security Can Sour M&A Deals

Steve Durbin featured in Forbes to highlight key cyber security dimensions to consider when entering the merger and acquisition process.

published 05 - July - 2022
Read More
World Economic Forum

Six Steps to Validate Cyber Incident Response Plans in Times of Conflict

Steve Durbin features in the World Economic Forum, offering considerations to consider when evaluating cyber incident response capabilities.

published 28 - June - 2022
Read More
Supply Chain Brain

Five Ways to Secure the Supply Chain in Times of Conflict

Steve explains the five steps organisations can take to help mitigate potential threats against the supply chain and be better armed.

published 15 - June - 2022
Read More
PropertyCasualty360

Three Unintended Consequences of Well-Intentioned Cyber Regulations

Steve explains how you can prepare against unintended consequences of cyber regulations, no matter how well-intentioned they might be.

published 10 - June - 2022
Read More
Forbes

What's Zero Trust, and What's Driving Its Adoption?

Steve Durbin deconstructs Zero Trust; explaining how it works, what the common misconceptions are, and what to consider before implementation.

published 08 - June - 2022
Read More
Security Magazine

7 Steps to Combat Cybersecurity Threats in Times of Instability

Steve Durbin outlines steps organisations and security teams can use to understand and prepare for potential threats in times of instability.

published 18 - May - 2022
Read More
Forbes

How Cybersecurity Leaders Can Add Value to M&A Deals

Steve Durbin offers advice on the M&A process: how you can mitigate risk and highlight to leadership the value of information security.

published 10 - May - 2022
Read More
Emerging Threats

World's Largest Cybersecurity Benchmarking Study Finds that Top Executives Believe their Organizations are Not Prepared for New Era of Risk

ThoughtLab's press release for their study, providing evidence-based insights into the most effective cybersecurity practices and investments.

published 10 - May - 2022
Read More
Emerging Threats

Cyber Risks for the Emerging 5G Era

Steve Durbin expands upon the risks, not only to individuals and businesses, but also to nations as 5G technologies transform communications.

published 29 - April - 2022
Read More
Risk

Five Proactive Steps CISOs Can Take During Times of Instability

Steve Durbin outlines how CISOs can shift from being reactive to proactive, improving the overall resilience of their organisation.

published 22 - April - 2022
Read More
Risk

5 Levers Lawmakers Can Use to Tackle Cybercrime

Steve Durbin breaks down each element of the cybersecurity framework presented in the recently released report led by the ISF with CC-Driver.

published 11 - April - 2022
Read More
Security Middle East

The Importance of Effective Cyber Risk Management

Dan Norman looks at what needs to be considered when evaluating the risks involved in an organisation’s security strategy.

published 07 - April - 2022
Read More
Computer Weekly

Revised Scope of UK Security Strategy Reflects Digitised Society

The omission of the word ‘security’ from the title of the UK government’s new National Cyber Strategy is a telling one.

published 25 - March - 2022
Read More
Forbes

Four Major Cyber Risks in an Era of Tech Dominance

Read as Steve explores the technological risks that may lead to crises in the next decade in his latest article for Forbes.

published 16 - March - 2022
Read More
Computer Weekly

Security Think Tank: Good training is all about context

Emma Bickerstaffe explores what makes a good security training programme and questions buyers should ask when procuring training as a service.

published 04 - March - 2022
Read More
Security Middle East

Positively Influencing Security Behaviour

Daniel Norman, ISF Senior Solutions Analyst, takes a closer look at 'Human-Centred Security' and how to achieve it.

published 23 - February - 2022
Read More
Security Middle East

How to Secure a Smart City

Dan Norman discusses the security challenges ahead with the continued shift to smart cities becoming an attractive target for cyber attackers.

published 07 - February - 2022
Read More
Forbes

Confronting Pervasive Cyber Threats for 2022 and Beyond

Discussing key pervasive cyber threats for 2022, Steve Durbin's recent Forbes article presents a strong foundation for security teams.

published 24 - January - 2022
Read More
Ransomware

The Six Best Practices to Prevent Ransomware Infection

Read Steve Durbin's latest article addressing the most common ransomware attack techniques whilst offering guidance on their prevention.

published 21 - January - 2022
Read More
Security Magazine

10 Cognitive Biases that can Derail Cybersecurity Programs

Read Steve Durbin's latest article highlighting the impact of the unconscious mind upon cybersecurity vulnerabilities.

published 17 - January - 2022
Read More
Technology

Is the IT Sector Beset by Fear-Mongering?

Paul Watts features in this Computer Weekly article aimed at helping security professionals lead with knowledge, rather than react with fear.

published 22 - December - 2021
Read More
Computer Weekly

Security Think Tank: Reframing CISO-boardroom relations

Read Emma Bickerstaffe's latest article for Computer Weekly as she offers CISO's food-for-thought following the pandemic.

published 20 - December - 2021
Read More
Other

"log4j 2" - a perfect way to ruin a security professional's weekend

By now Members will be very familiar with the concern around the 'log4j 2' remote code execution vulnerability; Apache's java-based logger library also known as 'Log4Shell'. This vulnerability is filed as CVE-2021-44228 in the NIST National Vulnerability Database.

published 16 - December - 2021
Read More
Forbes

Zero Trust: Five Misconceptions Every Business Should Avoid

Cybercrime is a major threat to every industry and organization in the world. No wonder global entities are desperately seeking a silver bullet that can somehow neutralize cybersecurity threats.

published 06 - December - 2021
Read More
Computer Weekly

Dissecting the true value of SASE is a challenge

As a relatively nascent technology that is getting a lot of publicity, dissecting the true…

published 01 - December - 2021
Read More
Other

Maritime Cyber Security: A Global Challenge Tackled through Distinct Regional Approaches

Maritime cyber security is an emerging issue that requires immediate attention, according to the International Maritime Organization (IMO). Feedback received from global shipping professionals indicate that a common threat to the industry, such as cyber security, is dealt with differently among industry practitioners around the globe.

published 30 - November - 2021
Read More
Ransomware

Why Does Ransomware Still Work?

Paul Watts, distinguished analyst, contributes to how ransomware has managed to retain its high profile in cybercrime for Computer Weekly.

published 30 - November - 2021
Read More
WSJ

Federal Cybersecurity Directive Spotlights Aging Computer Systems

Chronis Kapalidis, Principal at the ISF featured in WSJ. Many of the cybersecurity gaps outlined…

published 09 - November - 2021
Read More
Other

Is cyber insurance a worthwhile investment?

Here are five questions to help determine if your company needs cyber coverage. The cyber…

published 02 - November - 2021
Read More
Forbes

Understanding And Responding To Ransomware Threats

To pay or not to pay? Notwithstanding the ethical and emerging federal legal liability issues…

published 27 - October - 2021
Read More
Ransomware

Demystifying zero trust and how it helps with ransomware

Zero trust is a strategy organisations will need to look at implementing in the same…

published 15 - October - 2021
Read More
Security Magazine

Prepare, respond, resume

Dan Norman, senior solutions analyst at the Information Security Forum, guides us through the key…

published 07 - October - 2021
Read More
Technology

Embracing vulnerability management for the greater good

It is important to recognise that although setting out a policy and process for RD…

published 04 - October - 2021
Read More
Other

The next wave of cyberattacks will have 5G to thank

Given the high stakes, security should be at the forefront of 5G rollout plans At…

published 04 - October - 2021
Read More
Computer Weekly

Giant Group cyber attack prompts renewed calls for statutory regulation of umbrella companies

The speed of the outage and the protracted nature of the recovery bears all of…

published 01 - October - 2021
Read More
Forbes

Artificial Intelligence: The Future Of Cybersecurity?

The number of devices and associated challenges are far too many. IIoT devices possess limited…

published 23 - September - 2021
Read More
Computer Weekly

A response to planned data protection changes

As the UK chases a Brexit dividend to open up non-EU markets to UK businesses…

published 07 - September - 2021
Read More
Other

An Effective Supply Chain Starts With Security

For more advanced, sophisticated supply chains, it’s about continually going back over it to increase…

published 06 - September - 2021
Read More
Other

How criminals use artificial intelligence to fuel cyber-attacks

AI systems and can be entrenched by programmers or specific data sets. Unfortunately, if this…

published 01 - September - 2021
Read More
Other

What CISOs need to know about Wi-Fi 6E

Until now, there were limitations on some of the heavier network related devices like virtual…

published 24 - August - 2021
Read More
Other

What are the risks associated with personal, unsanctioned apps on corporate devices and why?

From a security perspective, what are the personal apps/app types that you think CISOs should…

published 24 - August - 2021
Read More
Other

Commercial Shipping Is the Next Cybersecurity Challenge

there is a misbelief that ships are not vulnerable to cyber incidents, leading to an…

published 17 - August - 2021
Read More
Forbes

Are 5G Networks Setting The Stage For A New Wave Of Cyberattacks?

...the sheer volume and velocity of 5G networks, combined with the complex infrastructure and heavy…

published 11 - August - 2021
Read More
Security Magazine

The transport threat

Ransomware will proliferate over the coming years, with attackers locking individuals into, or out of,…

published 29 - July - 2021
Read More
Other

Adapting InfoSec for Container Security

Containerization has effectively become the new normal for expediting app delivery and improvements; security concerns…

published 27 - July - 2021
Read More
Other

NCSC head champions UK-Israeli cyber relationship amid spyware accusations

Organisations often have the best of intentions when creating some of these types of software,…

published 26 - July - 2021
Read More
Computer Weekly

A return to the office is not a return to normal

Perhaps the biggest change that CISOs need to accept is that hybrid working is how…

published 20 - July - 2021
Read More
DarkReading

The Trouble With Automated Cybersecurity Defenses

Speed and accuracy in identifying and responding to threats are the alluring promises of automated…

published 13 - July - 2021
Read More
Forbes

Questions To Ask To Help You Prepare For A Cyberattack

Develop a holistic backup strategy that covers all systems and core infrastructure services. Steve Durbin,…

published 23 - June - 2021
Read More
Security Magazine

Top 5 cybersecurity challenges in the hybrid office

The pandemic has caused a tectonic shift in how we live and work. Many companies…

published 18 - June - 2021
Read More
Other

How a Security Architecture Can Keep Your Organization Upright Amid Future Upheaval

By Steve Durbin, Chief Executive of the ISF As organizations claw their way back from…

published 18 - June - 2021
Read More
Computer Weekly

Time to accept printers will leak data

Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses…

published 14 - June - 2021
Read More
Other

Designing and Building a Security Architecture

Ultimately, a well-designed security architecture will enhance understanding, simplify decision-making, improve efficiency and contain costs.…

published 10 - June - 2021
Read More
Security Magazine

Watch this space

Satellites support so much of our business infrastructure, but being in space doesn't make them…

published 02 - June - 2021
Read More
Forbes

Ransomware Is Everywhere — Here’s What You Need To Consider

Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the…

published 01 - June - 2021
Read More
Other

What the FLoC? Everything you need to know about Google’s new ad tech that aims to replace third-party cookies

First party cookies are really useful. For instance, they mean you don’t have to log…

published 19 - May - 2021
Read More
Computer Weekly

The case for vaccine passports: the real world versus the digital world

Distinguished Analyst Andy Jones and Senior Analyst Alex Jordan, both of the ISF, take opposing…

published 11 - May - 2021
Read More
Forbes

Threat Horizon 2023: Four Evolving Threats That Should Be On Your Radar

The mass migration of people out of the workplace and into the home prompted a sharp rise in cybersecurity incidents.

published 30 - April - 2021
Read More
Forbes

The Challenge Of Continuous Assurance For Supply Chains

Building resilience and agility into a supply chain to cope with fluctuations in demand and meet business goals is a major challenge.

published 19 - April - 2021
Read More
DarkReading

6 Tips for Managing Operational Risk in a Downturn

By Steve Durbin, Chief Executive of the ISF Coping with heightened operational risk during a…

published 16 - April - 2021
Read More
Security Magazine

How Cyber Security Criminals Exploit the 'Accidental Insider'

In the first of his regular new information security columns for Security Middle East, Daniel…

published 14 - April - 2021
Read More
Array
Other

Eurasia Risks 2021 - Global Cyber Crisis

The first nation state to develop technologies such as AI, 5G, robotics and quantum computing…

published 12 - April - 2021
Read More
Other

Eurasia Risks 2021 - Digital Totalitarianism

Highly connected ecosystems of digital devices will enable the harvest, repurpose and sale of sensitive…

published 12 - April - 2021
Read More
Other

The new reality of a world online

Interview with Steve Durbin, Chief Executive of the ISF and The European  The combination of…

published 06 - April - 2021
Read More
Forbes

How To Develop A Human-Centered Security Program

While many organizations have a security awareness training program in place, few trigger real behavior change or...

published 25 - March - 2021
Read More
Other

How Retailers Can Tackle Supply Chain Data Risk

By Steve Durbin, Chief Executive of the ISF Make security a core consideration in procurement…

published 16 - March - 2021
Read More
Forbes

Technology Is Just A Tool: Why People Are The Heart Of Everything We Do In Business

The idea that technology can solve all our problems is seductive. It seems like every product vendor claims to...

published 01 - March - 2021
Read More
Computer Weekly

Security Think Tank: Towards a united state of security

By Jordon Kelly, Research Analyst at the ISF Of his new national security appointments, president…

published 17 - February - 2021
Read More
Other

Three Steps to Securing Supply Chains Under Pressure

By Steve Durbin, Chief Executive of the ISF  You need to establish continuous monitoring across…

published 15 - February - 2021
Read More
Forbes

Eight Cyber Challenges In An Uncertain World

With the pandemic precipitating a health crisis that continues to threaten the global economy and the real possibility of a...

published 10 - February - 2021
Read More
Forbes

Six Ways A Good Leader Can Become A Great Leader

Many people can become good leaders. After all, you can learn how to communicate and how to be a better listener; you can...

published 09 - February - 2021
Read More
InfoSecurity

Cybercrime to Scale New Heights in 2021: What Can You do About it?

By Steve Durbin, Chief Executive of the ISF With the pandemic precipitating a rapid acceleration…

published 08 - February - 2021
Read More
SC Media

Words of advice for President Biden’s new CISO

By Steve Durbin, Chief Executive of the ISF Cybersecurity should sit at the core of…

published 04 - February - 2021
Read More
Computer Weekly

Security Think Tank: Time to rethink stopgap solutions

By Paul Holland, Principle Research Analyst at the ISF Home working assumes a certain level…

published 26 - January - 2021
Read More
SC Media

Look for GDPR fines to increase, extend beyond breaches

organizations should in particular note the extent of fines levied by regulators for infringements that…

published 25 - January - 2021
Read More
Forbes

Five Threat Vectors Destined To Make Waves In 2021

By Steve Durbin, CEO of the Information Security Forum, and Forbes Business Council Member Building…

published 20 - January - 2021
Read More
Other

New Year’s Resolutions for the Board in 2021

By Steve Durbin, CEO of the ISF Maturing your organization’s ability to detect intrusions quickly…

published 13 - January - 2021
Read More
Other

AI’s Two Achilles’ Heels Keep Me Up at Night

All the social techniques cybercriminals currently employ could be improved immeasurably with the help of…

published 11 - January - 2021
Read More
InfoSecurity

Where to Focus Security Resources Mid- and Post-Pandemic

By Steve Durbin, CEO of the ISF Business leaders will inevitably need to make difficult…

published 08 - January - 2021
Read More
Other

Cybersecurity Must Be the Top Priority for the Board in 2021

By Steve Durbin, CEO of the ISF Leading the enterprise to a position of readiness,…

published 07 - January - 2021
Read More
DarkReading

10 Benefits of Running Cybersecurity Exercises

By Steve Durbin, Managing Director of the ISF. There may be no better way to…

published 06 - January - 2021
Read More
Other

2020 Work-for-Home Shift: What We Learned

One area that organizations need to deal with is the rise of the insider threat,…

published 05 - January - 2021
Read More
SC Media

Privacy 2020: From Prepared to Alarmed, the Year the Rubber Hit the Road

With 2020 coming to a close, SC Media is delivering through a series of articles…

published 04 - January - 2021
Read More
DICE

Cybersecurity in 2021: 5 Trends Security Pros Need to Know

The insider threat is one of the greatest drivers of security risks that organizations face…

published 21 - December - 2020
Read More
Other

ISF Proposal for “Human-Centered Security” Focuses Security Awareness on People’s Interactions With Technology

How can security keep pace with a cyber threat landscape that rapidly becomes more sophisticated…

published 18 - December - 2020
Read More
BetaNews

Practical tips and advice for personal IoT security

By Daniel Norman, Senior Solutions Analyst at the ISF A large portion of IoT-related breaches…

published 18 - December - 2020
Read More
Security Magazine

Top Global Security Threats Organizations Will Face in 2021

Attackers will continue to be presented with the tools and opportunities to target and exploit…

published 17 - December - 2020
Read More
SC Media

Ransomware attacks target backup systems, compromising the company ‘insurance policy’

The success of ransomware is reliant on whether or not the target organization has patched…

published 16 - December - 2020
Read More
Forbes

Eight Steps To Building A Human-Centered Security Culture

By Steve Durbin, Managing Director, Information Security Forum, and Forbes Business Council Member Ransomware, phishing,…

published 15 - December - 2020
Read More
Threatpost

Conti Gang Hits IoT Chipmaker Advantech with $14M Ransom Demand

Payment of a ransom is also a contentious discussion – in many cases the ransom…

published 11 - December - 2020
Read More
Security Magazine

New Information Security Forum Research Explores Human-Centered Security

Technology and processes should complement behavior, not add friction and impede productivity... Steve Durbin, Managing…

published 07 - December - 2020
Read More
SC Media

Websites Requiring Security Software Downloads Opened Door to Supply Chain Attack

I, for one, am wary if a website asks me, unprompted, to download anything. It…

published 07 - December - 2020
Read More
Security Magazine

CISA Warns Public About Online Holiday Shopping Scams

Also, beware of email “offers” from companies you don’t recognize and even those that you…

published 04 - December - 2020
Read More
Threatpost

Changing Employee Security Behavior Takes More Than Simple Awareness

A human-centered security program helps organizations to understand their people and carefully craft initiatives that…

published 03 - December - 2020
Read More
DarkReading

Why Security Awareness Training Should Be Backed by Security by Design

As a starting point, an individual will always choose to be productive in their current…

published 02 - December - 2020
Read More
Other

Information Security Forum Research Dives Into the Need for Human-Centered Security

A typical strategy should aim to reduce the number of security incidents and improve the…

published 01 - December - 2020
Read More

Information Security Forum Addresses Global Security Issues at 31st Annual World Congress

The Information Security Forum (ISF), the trusted source that senior security professionals and board members…

published 30 - November - 2020
Read More
BetaNews

Human-Centred Approach is Key to Better Security

Errors and acts of negligence can cause significant financial and reputational damage to an organization,…

published 27 - November - 2020
Read More
InfoSecurity

Organizations Should Use Psychology to Promote Secure Behavior Among Staff

Errors and acts of negligence can cause significant financial and reputational damage to an organization...…

published 27 - November - 2020
Read More
Other

Qbot Banking Trojan Now Deploying Egregor Ransomware

Organizations should have an incident response or crisis management plan for ransomware events, knowing who…

published 26 - November - 2020
Read More
Other

Cybersecurity Workforce Study Needs to be Taken with a Pinch of Salt

Apprenticeships, on the job learning, backed up with support training packages are the way to…

published 25 - November - 2020
Read More
DICE

Remote Work in 2021: Cybersecurity Grows in Importance

The global COVID-19 pandemic has forced digital change on organizations at high speed and certainly…

published 23 - November - 2020
Read More
Threatpost

Apple to Deliver ‘Privacy Labels’ for Apps, Revealing Data-Sharing Details

Just as consumers now automatically accept cookies and agree to privacy policies, they may also…

published 20 - November - 2020
Read More
Security Magazine

CISA: Ransomware Activity Targeting the Healthcare and Public Health Sector

Privacy should also be a high priority for anyone handling sensitive information, considering the shift…

published 19 - November - 2020
Read More
Other

Imminent Cyberthreat Could Disrupt Hundreds of US Healthcare Systems

Basic cyber hygiene standards need to be met, covering patching and updates, network segmentation, network…

published 16 - November - 2020
Read More
DarkReading

6 Cybersecurity Lessons From 2020

The [pandemic] accelerated and concentrated forces, such as the move to remote working and adoption…

published 16 - November - 2020
Read More
Other

Skills Shortage Rains on Cloud Advances

Cross training within an organization is a good method of closing the skills gap by…

published 16 - November - 2020
Read More
Other

FBI: Hospitals and Healthcare Providers Face Imminent Ransomware Threat

The healthcare services have an outdated approach to security awareness, education, and training... Daniel Norman,…

published 11 - November - 2020
Read More
DICE

What Skills Will Cybersecurity Leaders Want in 2021?

All infosec teams have been under huge pressure lately and good CISOs acknowledge that and…

published 10 - November - 2020
Read More
InfoSecurity

Trust in Remote Working Tools Declines as Need for Security Increases

...overdependency on untested technologies, new vulnerabilities in systems, poorly constructed policies and a lack of…

published 06 - November - 2020
Read More
Forbes

Three Common Digital Transformation Challenges — And How To Overcome Them

By Steve Durbin, Managing Director of the ISF and Forbes Business Council Member Once expectations are…

published 05 - November - 2020
Read More
Other

Why ransomware has become such a huge problem for businesses

Anyone with access to the Dark Web can buy readily available ransomware kits for less than $100.…

published 04 - November - 2020
Read More
Security Magazine

Carnival ransomware attack affected three brands

Creating a cyber-savvy workforce that takes information security seriously, while nurturing a culture of trust,…

published 03 - November - 2020
Read More
Other

What Can Businesses Learn from the Cyber Security Challenges of Coronavirus

As we come out of lockdown and start to negotiate the economic fallout it has…

published 02 - November - 2020
Read More
Other

Norway Alleges Russia Orchestrated Parliament Email Hack

The attacking state will build user profiles, understand patterns of behavior and then they will…

published 30 - October - 2020
Read More
Other

Why Organizations Should Be Wary of the Security Risks Posed by Augmented Reality

By Steve Durbin, Managing Director of the ISF AR promises much, but organizations will soon…

published 29 - October - 2020
Read More
Other

ISF Supports Cyber and Compliance Challenges with Launch of Aligned Tools Suite 2020

We live in an uncertain world where budgets and resources are tight, yet the need…

published 28 - October - 2020
Read More
InfoSecurity

#NCSAM: How Can Consumers Boost the Security of IoT Devices?

...individuals should proactively try and seek out vulnerability forums online and regularly assess whether exploits…

published 27 - October - 2020
Read More
DICE

Cybersecurity, Cloud Skills: Key to Companies’ Digital Transformation

Increasingly, lockdown has driven us all online and the training industry has been somewhat slow…

published 26 - October - 2020
Read More
Other

How the Enterprise Can Shut Down Cyber Criminals and Protect a Remote Staff

Non-security incidents can have a substantial knock-on effect within the information security spectrum Steve Durbin,…

published 22 - October - 2020
Read More
BetaNews

How to Enhance Security Education, Training and Awareness for Employees

By Daniel Norman, Senior Solutions Analyst at the Information Security Forum. Frequently delivering micro-content, using…

published 21 - October - 2020
Read More
Security Magazine

65% of leaders say that security awareness training is not a top priority

The best security policies are under constant review and take into account ongoing feedback. Archaic…

published 19 - October - 2020
Read More
Other

Research Reveals Gaps in Cybersecurity Training Initiatives Within Remote Workforce

By helping staff understand how vulnerabilities can lead to poor decision making and errors, organizations…

published 19 - October - 2020
Read More
Security Magazine

Six core characteristics that next-generation CISO’s exhibit

Being a next-generation CISO is an extremely rewarding position that allows an individual to become…

published 16 - October - 2020
Read More
Security Magazine

UHS Hospitals hit by Ryuk ransomware, forced to shut down systems

Attackers will once again turn their attention to disrupting the health service by targeting poorly…

published 15 - October - 2020
Read More
Other

Cyber Experts Weigh-In: Universal Health Services Hospital System Ransomware Attack

This is an exciting time for the healthcare industry but it is also dangerous. As…

published 14 - October - 2020
Read More
Forbes

How Criminals Use Artificial Intelligence To Fuel Cyber Attacks

By Steve Durbin, Managing Director of the Information Security Forum, and Forbes Business Council Member…

published 14 - October - 2020
Read More
InfoSecurity

Research: Cloud Skills and Solutions Are in Short Supply

Shortages in skills and capabilities are being revealed as major security incidents damage organizational performance…

published 13 - October - 2020
Read More
InfoSecurity

Suspected Ransomware Takes Out Major US Healthcare Provider

Privacy should also be a high priority for anyone handling sensitive information, considering the shift…

published 12 - October - 2020
Read More
Threatpost

Ring’s Flying In-Home Camera Drone Escalates Privacy Worries

 Smart home devices, such as Ring, collect an inordinate amount of sensitive personal data in…

published 08 - October - 2020
Read More
Other

Insider vs. Outsider Data Security Threats: What’s the Greater Risk?

As data breaches increase, many will be the result of Insider threats. In fact, the…

published 06 - October - 2020
Read More
Threatpost

Georgia Election Data Hit in Ransomware Attack

Typically, the success of ransomware is reliant on whether or not the target organization has…

published 03 - October - 2020
Read More
InfoSecurity

ISF Outlines the Key Skillsets of Modern CISOs

As digital transformation drives organizations to become more agile and responsive, the CISO faces demands…

published 02 - October - 2020
Read More
Other

Cuts to Digital Security Spending Right Now Would Be a Big Mistake

By Steve Durbin, Managing Director, Information Security Forum As we head into Cybersecurity Awareness Month…

published 01 - October - 2020
Read More
BetaNews

What does it take to be a next generation CISO?

Becoming a next-generation CISO requires an individual to embrace and master new skills and disciplines,…

published 30 - September - 2020
Read More
Forbes

Six Skills CISOs Should Pursue To Elevate Their Role

By Steve Durbin, Managing Director, Information Security Forum, and Forbes Business Council Member A rapid…

published 29 - September - 2020
Read More
Computer Weekly

Security Think Tank: Beware security blind spots at the edge

That datacentre security is a complex subject is not in doubt and, given the trend…

published 21 - September - 2020
Read More
Other

Threats from the digital world lead to greater cyber security concerns

Organizations will have to adapt quickly to survive when digital and physical worlds collide. By…

published 21 - September - 2020
Read More
Security Magazine

Tesla and FBI thwart $1 million Russian Ransomware hack

“Ransomware is one of the most prevalent threats to an organization’s information and is more…

published 02 - September - 2020
Read More
DICE

Why the Cybersecurity Skills Gap Continues to Widen

“In today’s COVID-19 reality, to rectify the continued cyber skills shortage, organizations are being encouraged…

published 25 - August - 2020
Read More
Other

Ransomware Attack Hits Carnival Cruise Corporation: What We Know

"Ransomware attackers are not interested in stealing assets and using them to cause damage, but…

published 20 - August - 2020
Read More
Forbes

5G Brings Benefits, But Also Heralds Fresh Security Threats

By Steve Durbin, Managing Director, ISF and Forbes Business Council Member The continuing rollout of…

published 19 - August - 2020
Read More
DICE

Your Work-From-Home Future: Now’s the Time to Think About Security

“Employees subject to new working arrangements may well react maliciously due to limited hours, lowered compensation,…

published 18 - August - 2020
Read More
Threatpost

Cybersecurity Skills Gap Worsens, Fueled by Lack of Career Development

“Increasingly, lockdown has driven us all online and the training industry has been somewhat slow…

published 17 - August - 2020
Read More
DarkReading

Why Data Ethics Is a Growing CISO Priority

With data collection growing, and increased concern about how it is handled, a synergy between…

published 11 - August - 2020
Read More
DarkReading

The Future's Biggest Cybercrime Threat May Already Be Here

By Steve Durbin, Managing Director, ISF Current attacks will continue to be refined, and what…

published 04 - August - 2020
Read More
Forbes

How To Prepare Your Business As Worldwide Recession Looms

By Steve Durbin, Managing Director, ISF and Forbes Business Council Member The business world is…

published 27 - July - 2020
Read More
Other

The Internet Of Forgotten Things Will Leave A Dangerous Legacy

By Steve Durbin, Managing Director, ISF The Internet of Things (IoT) infrastructure will soon become…

published 24 - July - 2020
Read More
DarkReading

Quantifying Cyber Risk: Why You Must & Where to Start

"The challenge for security is to be able to translate security metrics into a form…

published 22 - July - 2020
Read More
Computer Weekly

Security Think Tank: Balancing human oversight with AI autonomy

Artificial intelligence and machine learning techniques are said to hold great promise in security, enabling…

published 22 - July - 2020
Read More
Other

On the Cybersecurity Horizon: Digital and Physical Worlds Set to Collide

By Steve Durbin, Managing Director, ISF The digital and physical worlds are on an irreversible…

published 21 - July - 2020
Read More
SC Media

EU court kills Privacy Shield, wreaks havoc on digital economy

Schrems II “Was always going to be a major test for the Privacy Shield,”  Steve…

published 17 - July - 2020
Read More
Security Magazine

Deepfakes will tell true lies

By Steve Durbin, Managing Director, ISF In the coming years, advanced deepfakes of high-profile individuals…

published 14 - July - 2020
Read More
InfoSecurity

The Digital Generation Will Become the Cyber-Criminal’s Dream

By Steve Durbin, Managing Director, ISF Over the next few years, the first truly digital…

published 03 - July - 2020
Read More
Computer Weekly

Security Think Tank: ‘Shift left’ to secure containers

Adopting containers promises great organisational efficiency advantages, but the fast-evolving technology can be problematic for…

published 01 - July - 2020
Read More
DICE

Cybersecurity Budgets: Will They Survive COVID-19?

“Security leaders will need to adapt, swiftly, to speaking the language of the business in…

published 30 - June - 2020
Read More
Other

Open Source Security Issues Exist: Deal With Them, Report Urges

Open Source Software is becoming much more commonplace within organizations, bringing a different set of…

published 29 - June - 2020
Read More
Other

COVID19, Cybersecurity and the Healthcare Industry

By Daniel Norman, Research Analyst, ISF The healthcare industry has been under immense pressure during…

published 29 - June - 2020
Read More
Other

Cybersecurity 2020: challenges and threats to be aware of

The risk and severity of cyber-attacks have increased over the past few years. In recent…

published 23 - June - 2020
Read More
BetaNews

Extreme weather will inflict chaos on infrastructure

In the coming years, extreme weather events will become more frequent and widespread, devastating areas…

published 22 - June - 2020
Read More
Forbes

Having Cash Flow Problems? 15 Areas To Investigate

Businesses that may be feeling the pinch concerning their income might start by finding ways…

published 19 - June - 2020
Read More
Forbes

Promoting A Culture Of Adaptability: 16 Effective Tips For Businesses

Business leaders are aware of how important it is to be adaptable to survive market…

published 12 - June - 2020
Read More
Other

Augmented Attacks Expected to Distort Reality

In the coming years, new technologies will further invade every element of daily life with…

published 11 - June - 2020
Read More
DICE

COVID-19: Rethinking Cybersecurity in a Post-Pandemic World

It’s been four months since COVID-19 was declared a global pandemic by the World Health Organization (WHO).…

published 04 - June - 2020
Read More
Other

The internet of forgotten things will bite back

In the coming years, internet of things (IoT) infrastructure will become unmanageable and impossible to…

published 29 - May - 2020
Read More
Security Magazine

70% of Organizations to Increase Cybersecurity Spending Following COVID-19 Pandemic

With coronavirus crisis creating new opportunities for cybercriminals, 70 percent of organizations are seeing the…

published 27 - May - 2020
Read More
Other

Robo-helpers will soon help themselves to data

Poorly secured robo-helpers will be weaponised by attackers. By Steve Durbin, Managing Director, ISF Over…

published 21 - May - 2020
Read More
Threatpost

Leaked NHS Docs Reveal Roadmap, Concerns Around Contact-Tracing App

Future features include plenty of self-reporting options, and officials’ fears the data could be misused.…

published 20 - May - 2020
Read More
Other

Cybersecurity Threats to the Food Supply Chain

When Smithfield Foods closed its Sioux Falls pork processing plant – joining other meat and…

published 18 - May - 2020
Read More
Computer Weekly

Security Think Tank: Create healthy habits to avoid burnout

Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working…

published 14 - May - 2020
Read More
Other

Remote work: 6 common misunderstandings about online security threats

VPN, cloud, and phishing misunderstandings show up in myths about security and remote work. Security…

published 13 - May - 2020
Read More
Security Magazine

Information Security Forum Releases Updated Guide to Security Best Practices

The Information Security Forum (ISF) has published a major update to its Standard of Good Practice (The…

published 11 - May - 2020
Read More
Security Magazine

Vishing and Cybercriminals during COVID-19

The COVID-19 pandemic has resulted in an upshot of all types of scams. In the…

published 05 - May - 2020
Read More
Other

Understanding the CFO’s Cybersecurity Role in the Age of COVID-19

Senior executives understand that today’s global economy is still not adequately protected against cyberattacks, despite…

published 04 - May - 2020
Read More
SC Media

Google, Apple tighten protections on contact tracing; Americans worry over privacy

As the likes of Google and Apple bolster privacy in the race to come up…

published 01 - May - 2020
Read More
Other

The Impact of Coronavirus on the Threat Landscape

How has the coronavirus impacted the outlook on security over the next few years? The…

published 28 - April - 2020
Read More
SC Media

Connecticut town drops drone program to combat COVID-19 spread over privacy concerns

“Like other Internet of Things (IoT) devices, drones currently have very poor security controls, making…

published 28 - April - 2020
Read More
DarkReading

Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022

Researchers outline cybersecurity threats they predict businesses will face in two years as technology evolves.…

published 23 - April - 2020
Read More
Security Magazine

Risk Management, Insider Threats and Security Leaders in the Age of COVID-19

An insider threat is a security risk that originates from within an organization. According to…

published 22 - April - 2020
Read More
InfoSecurity

The Privacy-Security Balance in Digital Surveillance: Lessons from COVID-19

A major feature of the current COVID-19 crisis has been the sudden growth of state…

published 21 - April - 2020
Read More
Security Magazine

Information Security Forum: Nine Cybersecurity Threats Organizations can Expect Through 2022

The Information Security Forum (ISF) has released Threat Horizon 2022, the latest in a series of…

published 20 - April - 2020
Read More
Other

IoT security, neglected infrastructure, and a crisis of trust deemed major threats for 2022

The Information Security Forum predicts the coming threats with a very good track record so…

published 16 - April - 2020
Read More
DarkReading

When All Behavior Is Abnormal, How Do We Detect Anomalies?

Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects…

published 15 - April - 2020
Read More
InfoSecurity

If Remote Working is the New Norm, How Do We Do it Securely?

“My biggest concern is when remote workers enter phase three since it is unlikely that…

published 14 - April - 2020
Read More
Other

FBI: COVID-19-Themed Business Email Compromise Scams Surge

"Criminals have become more sophisticated by considering the psychological aspects of an attack," says Mark…

published 08 - April - 2020
Read More
Security Magazine

Nearly 10 Million People Filed for Unemployment in the US: What Does It Mean for the Cybersecurity and IT Workforce?

The number of new people claiming unemployment benefits totaled a staggering 6.648 million last week…

published 06 - April - 2020
Read More
Threatpost

Covid-19 Poll Results: One in Four Prioritize Health Over Privacy

“Ultimately we are being asked to trust our governments in their ability to handle personal…

published 01 - April - 2020
Read More
InfoSecurity

The Long-Term Impact of #COVID19 on the Cybersecurity Industry

“Remote working and remote business interactions will identify new opportunities, new ways of working that…

published 31 - March - 2020
Read More
Other

Impact of Coronavirus Outbreak on Early Stage Venture Investment in Cybersecurity

“I suspect that COVID-19 will tighten further the investment criteria being applied with a keener…

published 26 - March - 2020
Read More
InfoSecurity

The Short-Term Impact of #COVID19 on the Cybersecurity Industry

As we work remotely and isolate ourselves from friends and colleagues as best we can,…

published 26 - March - 2020
Read More
Other

As coronavirus spreads, cybersecurity staff contend with increasing attacks, remote workers

As the COVID-19 pandemic continues to spread, cybersecurity professionals have never been busier. Despite some reports of cybercriminals…

published 24 - March - 2020
Read More
Other

15 Coronavirus Online Scams to Watch Out For

“Our appetite for information is vast and cybercriminals know this so there may be attachments…

published 23 - March - 2020
Read More
Threatpost

Covid-19 Spurs Facial Recognition Tracking, Privacy Fears

The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues…

published 20 - March - 2020
Read More
Computer Weekly

Security Think Tank: To tackle Covid-19, be prepared, flexible and resilient

In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of…

published 18 - March - 2020
Read More
Security Magazine

European Electricity Association Confirms Hackers Breached its Office Network

ENTSO-E, the European Network of Transmission System Operators, has announced that it found evidence of…

published 17 - March - 2020
Read More
DarkReading

Keys to Hiring Cybersecurity Pros When Certification Can't Help

There just aren't enough certified cybersecurity pros to go around -- and there likely never…

published 16 - March - 2020
Read More
InfoSecurity

Infosecurity Magazine Q&A: Steve Durbin

Steve Durbin is a senior security leader at the Information Security Forum (ISF) with a diverse background…

published 16 - March - 2020
Read More
Other

ISF Coronavirus (COVID-19) Update

10th March 2020 ISF Coronavirus Update With the growing concerns regarding the Coronavirus (COVID-19) outbreak…

published 10 - March - 2020
Read More
Other

Use the human-centered approach for smarter security and compliance teams

By Steve Durbin, Managing Director of the Information Security Forum. As the cyberthreat landscape becomes…

published 05 - March - 2020
Read More
DICE

Insider Threats: How Co-Workers Became a Bigger Security Headache

One of the biggest security threats to your team might be the person working right…

published 03 - March - 2020
Read More
Other

Conquering the Cyber Security Challenges of The Cloud

By Steve Durbin, Managing Director, Information Security Forum Cloud computing has become a prevalent force, bringing…

published 26 - February - 2020
Read More
Security Magazine

US Sen. Gillibrand Announces Legislation to Create a Data Protection Agency

"As pressure from regulatory compliance increases, businesses must take an increasingly integrated and well-rounded approach…

published 17 - February - 2020
Read More
Other

Overcoming the Cyber Security Challenges of the Cloud

The rise in business processes supported by cloud services has been well evidenced by organizations…

published 14 - February - 2020
Read More
SC Media

Ringing in a new National Privacy Law?

Privacy advocates have long called for a federal privacy law and it’s coming…in the meantime,…

published 05 - February - 2020
Read More
Computer Weekly

Security Think Tank: Bug bounties are changing the image of hackers

The traditional picture of a hacker is of a script kiddie in a hoodie hunched…

published 03 - February - 2020
Read More
Security Magazine

Data Privacy Day 2020 Encourages Consumers to “Own Their Privacy”

The theme of Data Privacy Day 2020 is “Own Your Privacy.” Data Privacy Day began…

published 29 - January - 2020
Read More
Security Magazine

Lawmakers Introduce Bill to Reform NSA Surveillance

"This debate has been ongoing for some time now and there is clearly a need…

published 27 - January - 2020
Read More
Computer Weekly

Security Think-Tank: Tackle insider threats to achieve data-centric security

The belief that effective perimeter security is the best way to protect data is a…

published 24 - January - 2020
Read More
Other

World Economic Forum Global Risks Report Highlights Dangers of Digital innovation

"In a hyperconnected world, attack surfaces and interdependencies will grow astonishingly quickly," warns Steve Durbin,…

published 23 - January - 2020
Read More
Other

Eurasia Risks 2020: Exacerbation of the Battle for Technological Dominance

"Technological advances are not restricted to America and China. They are a global phenomenon both…

published 22 - January - 2020
Read More
Other

Five Reasons Why Supply Chain Security Must be on Your Agenda

How do you know that the critical parts inside your servers and devices are not…

published 20 - January - 2020
Read More
Other

Cybersecurity 2020: Welcome to the Digital Cold War

The race to develop strategically important next-generation technology will drive an increase in nation-state-backed attacks.…

published 13 - January - 2020
Read More
Other

The Top Three Global Cyber Security Threats for 2020

In the year ahead, organisations of all sizes must prepare for the unknown, so they…

published 13 - January - 2020
Read More
Other

Deciphering Artificial Intelligence in the Future of Information Security

Artificial Intelligence (AI) is creating a new frontline in information security. Systems that independently learn, reason and…

published 08 - January - 2020
Read More
Other

Maximise your defence with people power

Humans are often referred to as the “weakest link” in information security. However, organisations have…

published 08 - January - 2020
Read More
Other

Cybersecurity New Year’s Resolutions from the Information Security Forum

It’s that time of year again. Time for every one of us to reminisce on…

published 06 - January - 2020
Read More

How to Stay Safe Online in 2020 – What Experts Say

When it comes to your online safety, companies have some say in how safe you…

published 31 - December - 2019
Read More
Security Magazine

Information Security Forum Predicts 2020's Top Global Security Threats

The Information Security Forum (ISF), a resource for executives and board members on cybersecurity and risk…

published 11 - December - 2019
Read More
Other

Get the board on board: leading cybersecurity from the top down

"Boards are trying to get their arms around all of these different moving pieces,” said…

published 03 - December - 2019
Read More
Other

Securing the Internet of Things (IoT) in Today's Connected Society

The Internet of Things (IoT) promises much: from enabling the digital organization, to making domestic…

published 03 - December - 2019
Read More
Security Magazine

Information Security Forum Releases Internet of Things Guide

The Information Security Forum (ISF) announced the release of Securing the IoT: Taming the Connected World,  a report…

published 03 - December - 2019
Read More
InfoSecurity

Target Sues Insurer Over Data Breach Costs

Target is suing its insurer for costs of up to $74M that were incurred as a…

published 27 - November - 2019
Read More
Other

Leadership trends in cybersecurity - 5 predictions for the CISO in 2020

Usually, when someone writes predictions, it is just before or after New Year’s Eve. But…

published 21 - November - 2019
Read More
Other

ISF Releases Using Cloud Services Securely: Harnessing Core Controls

The growth of cloud computing has become ever more apparent, as organizations are drawn to…

published 20 - November - 2019
Read More
Security Magazine

Reducing the Risks Posed by Artificial Intelligence

Artificial Intelligence (AI) is creating a new frontier in information security. Systems that independently learn,…

published 13 - November - 2019
Read More
Other

Information Security Forum Partners with NIST to Create Online Informative References

Pilot Program Demonstrates ISF’s Commitment to Working with Leading Authorities on Information and Cyber Security-Related…

published 24 - October - 2019
Read More
Other

How Does Artificial Intelligence Fit into Cybersecurity's Future?

It's a question almost as old as cybersecurity itself. But some research from the Information…

published 15 - October - 2019
Read More
InfoSecurity

New ISF Paper Attempts to Demystify AI in Information Security

In a paper released today, the Information Security Forum is urging organizations to capitalize on the opportunities…

published 11 - October - 2019
Read More
SC Media

Tomorrow’s attacks today: How to defend against next-generation cyberattacks

Imagine sitting at the end of a fishing pier staring at the ocean on a…

published 09 - October - 2019
Read More
Other

Cyber Risks Force Banks to Rethink Vendor Relationships

Hefty questionnaires have long been a favored method for banks to perform due diligence on…

published 08 - October - 2019
Read More
Other

Phishing Still Catches Federal Employees Unaware

Continuous training and awareness is the key to protecting high-value agency assets. Last year, the…

published 04 - October - 2019
Read More
Other

Former Army Contractor Gets Prison Term for Insider Attack

A former U.S. Army contractor has been sentenced to two years in federal prison after…

published 03 - October - 2019
Read More
Other

Cyber Insurance Firm Cowbell Emerges From Stealth With $3.3 Million Seed Funding

Pleasanton, California-based cyber insurance firm Cowbell Cyber has emerged from stealth, announcing its Cowbell Factor…

published 25 - September - 2019
Read More
DarkReading

How Cybercriminals Exploit Simple Human Mistakes

A new report explores how attackers identify psychological vulnerabilities to effectively manipulate targets. "People make…

published 20 - September - 2019
Read More
Other

How Human-Centered Security Can Strengthen Your Organizations

Humans are often regarded as the "weakest link" in information security. However, organizations have historically…

published 20 - September - 2019
Read More
Other

Steve Durbin- MD of Information Security Forum Named MD of the Year in Information Technology for 2018/19

Steve Durbin- Managing Director of the Information Security Forum (ISF), Named European Business Magazine’s MD…

published 19 - September - 2019
Read More
Other

Information Security Forum Tackles Human-Centred Security in Latest Paper

According to the Information Security Forum (ISF), trusted resource for executives and board members on…

published 19 - September - 2019
Read More
Other

How Artificially Intelligent Malware Could Intensify Hackers’ Capabilities

Technology has advanced at an astounding rate in the past decade and the pace is…

published 17 - September - 2019
Read More
Other

Your Vulnerability is Someone Else's Pay Cheque

Bug bounties and crowd sourced penetration testing, why might you need them? Many organisations have…

published 13 - September - 2019
Read More
Security Magazine

Making Security Assurance More Business-Focused

In a fast-moving environment filled with evolving cyber threats, leaders want confidence that business processes,…

published 11 - September - 2019
Read More
Computer Weekly

Risk mitigation is key to blockchain becoming mainstream

What are the best and most effective ways information security professionals can use blockchain technology?…

published 06 - September - 2019
Read More
Other

Cyber Threats Are Increasing, but Security Budgets, Staff Aren’t

The age-old problem of misaligned security budgets and staffing continues, but they may not be…

published 29 - August - 2019
Read More
Other

Next-gen tech: Next-gen threats

The Malicious use of next-generation technology spells worrying times for the businesses. Steve Durbin, Managing…

published 23 - August - 2019
Read More
Other

The Cyber Security Threat Landscape Keeps Evolving

Ransomware is a major concern, but it isn’t the only cyber risk your organisation will face this…

published 21 - August - 2019
Read More
Other

GDPR Outlook: After First Record Fines, What’s Next?

Following the record penalties for Google, British Airways and Marriott under the European Union’s General Data Protection…

published 20 - August - 2019
Read More
Other

Security Assurance Is a Long-Term & Ongoing Investment

Taking a business-focused approach to security assurance is an evolution. It means going a step…

published 16 - August - 2019
Read More
Other

Automate security in increasingly complex hybrid environments

As new technologies and infrastructure such as virtualization, cloud, and containers are introduced into enterprise…

published 15 - August - 2019
Read More
DarkReading

Modern-Day SOCs: People, Process & Technology

As security operations centers (SOCs) continue to evolve, enterprises are challenged with enhancing their ability…

published 13 - August - 2019
Read More
SC Media

Russian hacking group STRONTIUM attacking corporate IoT devices

“Organizations are adopting smart devices with enthusiasm, not realizing that these devices are often insecure…

published 09 - August - 2019
Read More
Other

6 Ways to Stop the Loss of IT Assets to Remote Workers

Some remote workers work full-time outside of company walls. Others telecommute when travelling on business…

published 08 - August - 2019
Read More
Other

Vigilantes, tech giants and botched transformations threaten the digital marketplace

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving. By 2021,…

published 08 - August - 2019
Read More
Other

Pentagon Buys Equipment With Known Vulnerabilities: Audit

Despite national security concerns, the U.S. Department of Defense has purchased thousands of computers, printers…

published 05 - August - 2019
Read More
Other

Defending the Enterprise From the Coming Wave of Ransomware Attacks

Ransomware attacks faded from the headlines after the notorious WannaCry outbreak in 2017 and the…

published 26 - July - 2019
Read More
Other

The Growing Threat of Drones

Steve Durbin, Managing Director of ISF, recently spoke to SecurityWeek to discuss the threat of…

published 25 - July - 2019
Read More
Other

How to Avoid Cyber Threats by Disgruntled Employees

Disgruntled employees can prove to be the biggest threat for the cyber security of an…

published 25 - July - 2019
Read More
Other

Identity Management Sparks Friction Between Executives, Employees

Hackers often attack company networks using compromised login information, a challenge for cybersecurity leaders who…

published 18 - July - 2019
Read More
Other

Top-Down Strategies for Fending Off Cyberattacks

Cybersecurity demands awareness across the organisation. The CEO needs to make it happen. For Steve…

published 08 - July - 2019
Read More
InfoSecurity

Blockchain: A technical disrupter or business distractor?

The discussion at this month’s Infosecurity Europe panel on quantum computing, artificial intelligence and blockchain…

published 24 - June - 2019
Read More
Other

Information Security Forum Report Tackles Business-Focused Security Assurance Programs

The Information Security Forum (ISF), trusted resource for executives and board members on cyber security…

published 20 - June - 2019
Read More
InfoSecurity

Security Should Be Business Focused, Says ISF

A security assurance program that focuses on business needs can help organizations meet the needs…

published 19 - June - 2019
Read More
BetaNews

Security assurance needs a business-focused approach

Business leaders want to be confident that their operations will continue running as normal without…

published 19 - June - 2019
Read More
Other

Information Security Forum Report Looks at Business-Focused Security Assurance Programs

The Information Security Forum (ISF), trusted resource for executives and board members on cyber security and risk…

published 19 - June - 2019
Read More
Other

State-Backed Espionage Targets Next Gen Tech

In the coming years, nation states’ intelligence services will combine forces with commercial organizations to…

published 17 - June - 2019
Read More
InfoSecurity

Employees Out of Work After ASCO Hit by Ransomware

Nearly 1,000 employees in ASCO’s Zaventem, Belgium, office have been left incapable of doing their jobs…

published 13 - June - 2019
Read More
Other

Digital Vigilantes Weaponize Vulnerability Disclosure

Over the next two years, vulnerability disclosure will evolve from a predominantly altruistic endeavor to…

published 11 - June - 2019
Read More
Other

On the Horizon: Parasitic Malware Will Feast on Critical Infrastructure

Parasitic malware, which seeks to steal processing power, has traditionally targeted computers and mobile devices.…

published 04 - June - 2019
Read More
Other

How the C-Suite Can Build Tomorrow’s Cyber Security Workforce

The people, processes and technology that protect digital resources and manage cyber risk are essential…

published 24 - May - 2019
Read More
InfoSecurity

Moody's Downgrading of Equifax Is a Message to Boards

While affirming Equifax’s senior unsecured rating at Baa1 and short-term rating at Prime-2, Moody’s Investor Services downgraded the…

published 24 - May - 2019
Read More
DarkReading

Moody's Outlook Downgrade of Equifax: A Wake-up Call to Boards

The move provides another spark to light a fire under CISOs to improve how they…

published 23 - May - 2019
Read More
Other

Steve Durbin, ISF: Only AI-Based Security Solutions Will Fight AI-Based Malware

The ISF is one of the world’s leading independent authorities on cybersecurity and information risk…

published 22 - May - 2019
Read More
Other

Cloud providers are under attack - and sabotaged services will freeze operations

Over the next two years, cloud service providers will be systematically sabotaged by attackers aiming…

published 22 - May - 2019
Read More
Computer Weekly

Security Think Tank: Proper segregation is more important than ever

What are the security benefits and challenges of segregating IT environments, and how best are…

published 21 - May - 2019
Read More
Other

5G technologies will broaden attack surfaces

The arrival of 5G, with significantly faster speeds, increased capacity and lower latency, will change…

published 19 - May - 2019
Read More
Other

Latest Information Security Forum Report Tackles Blockchain and Security

Steve Durbin- Managing Director of the Information Security Forum (ISF), Named European Business Magazine’s MD…

published 09 - May - 2019
Read More
InfoSecurity

Blockchain Useful, Not Without Issues, Says ISF

The Information Security Forum (ISF) released its latest briefing paper, Blockchain and Security: Safety in Numbers, which identifies…

published 09 - May - 2019
Read More
BetaNews

Helping organizations understand the pros and cons of blockchain

Blockchain is often seen as a game-changer for businesses, governments and criminals alike. But, as…

published 08 - May - 2019
Read More
SC Media

The digital unraveling: Vigilantes, rogue competitors, big break ups, and broken trust

By 2021, the world will be significantly digitized and connected. Competing in the digital marketplace…

published 06 - May - 2019
Read More
Other

Everything Is Best When It Comes to Cybersecurity Best Practices

Because innovation is moving so rapidly, keeping up with industry best practices can seem like…

published 02 - May - 2019
Read More
Other

DHS: Federal Agencies Need to Patch Vulnerabilities Faster

The U.S. Department of Homeland Security is requiring that federal agencies speed up patching and…

published 02 - May - 2019
Read More
Other

How Data-Centric Security Solutions Thwart Insider Threats

Thwarting insider threats is one of the most difficult challenges for companies, organizations, and governments.…

published 01 - May - 2019
Read More
Other

Digital Cold War on the Horizon: Preparing for Systemic Global Attacks

By 2021, the world will be significantly digitized and connected. The race to develop the…

published 30 - April - 2019
Read More
Other

Growing Reliance on Digital Connectivity Amplifies Existing Risks, Creates New Ones

Information security threats are intensifying every day. Organizations risk becoming disoriented and losing their way…

published 24 - April - 2019
Read More
Other

'ShadowHammer' Spreads Across Online Gaming Supply Chain

A sophisticated supply-chain attack dubbed Operation ShadowHammer is becoming more pervasive, with the group targeting online gamers,…

published 24 - April - 2019
Read More
Other

Cybersecurity Predictions for 2019

The cybersecurity trends that have characterized 2018 are likely to continue in 2019, including the…

published 18 - April - 2019
Read More
Other

CWT accredited by government cyber security scheme

Travel management platform CWT has secured a UK government cyber essentials certification. The scheme is…

published 17 - April - 2019
Read More
Other

Threat Horizon 2021: The Cyber Attacks Businesses Need to Prepare for Now

ISF’s Steve Durbin details findings from the firm’s recent Threat Horizon 2021 report, highlighting the…

published 16 - April - 2019
Read More
Other

Managing the technology risk of yesterday, today and tomorrow

What does your organisation’s technology landscape look like, and is it secure? At a recent…

published 11 - April - 2019
Read More
Other

Verizon Report Brings the Critical Discussion of Insider Threats Back to the Boardroom

The list of the biggest dangers to information security are long for 2019, and ever-evolving.…

published 09 - April - 2019
Read More
Computer Weekly

Security Think Tank: How to reduce the impact of a potential cyber extinction event

How should businesses plan to survive a potential cyber attack extinction event? An extinction event…

published 08 - April - 2019
Read More
Other

Emerging Cyber Threats Leverage Society's Reliance on Connectivity & Intelligent Systems

By 2021, the world will be significantly digitized and connected. The race to develop the…

published 02 - April - 2019
Read More
Other

Rush to Digital Transformation Leaving Organizations More Vulnerable

Digital transformation was one of those buzz terms I heard both at RSA and during…

published 01 - April - 2019
Read More
Other

Microsoft Takes Control of 99 Websites From APT Group

Microsoft is using its legal muscle to push back against an advanced persistent threat group that…

published 29 - March - 2019
Read More
Other

Information Security Forum Launches Threat Horizon 2021

Annual report identifies emerging security themes organizations will face over the next two years as…

published 27 - March - 2019
Read More
Security Magazine

Incoming Cyber Threats: Is Your Organization Prepared?

Enterprises will face nine major threats, including vulnerabilities in software and other applications, state-backed espionage…

published 27 - March - 2019
Read More
Other

Top Tips for Improving Board Communication Around Security

A panel of security professionals discuss the top three tips for how CISOs and risk…

published 27 - March - 2019
Read More
BetaNews

Digital cold war and other emerging threats we'll face in the next two years

A new report from the Information Security Forum looks at the threats organizations can expect to face…

published 27 - March - 2019
Read More
InfoSecurity

Competitors Flout Rules in a Digital Cold War

Emerging information security threats will continue to impact business, and the Threat Horizon 2021 published by Information Security…

published 27 - March - 2019
Read More
Other

3 security threats businesses need to prepare for by 2021

IoT and digital transformation efforts will leave more businesses vulnerable to cyberattack, according to Information…

published 27 - March - 2019
Read More
Other

The Effective CISO Needs More Than a Control Framework

Chief Information Security Officers (CISOs) often talk about reducing the risk of financial loss to…

published 25 - March - 2019
Read More
Other

EU Seeks Better Coordination to Battle Next Big Cyberattack

The EU is looking to head off the next major cyberattack against Europe by creating…

published 22 - March - 2019
Read More
Forbes

Beware March Madness Phishing Scams And Cyber Attacks

Have you filled in your brackets? March Madness kicks off this week. The annual NCAA…

published 20 - March - 2019
Read More
Other

Is Your Supply Chain the weakest link?

Supply chains are a vital component of every organization's business operations and the backbone of…

published 19 - March - 2019
Read More
Other

6 Top Information Security Risks to Know in 2019

In the 20th century, a wave of technological advancement changed the global economy. The rise…

published 19 - March - 2019
Read More
Computer Weekly

Security Think Tank: Financial loss as a key security risk indicator

What should be the key cyber security risk indicator for any business? Key risk indicators (KRIs)…

published 13 - March - 2019
Read More
Other

Georgia County Pays $400,000 to Ransomware Attackers

Officials in Jackson County, Georgia, along with the FBI are investigating a ransomware attack that…

published 12 - March - 2019
Read More
Computer Weekly

Making unified threat management a key security tool

As data protection becomes critical to businesses, we look at how unified threat management can…

published 10 - March - 2019
Read More
Computer Weekly

5G one of several security challenges to CNI

5G technology is among the key security challenges facing critical national infrastructure and all other…

published 06 - March - 2019
Read More
Other

Banks won’t be able to remain on sidelines of privacy debate

WASHINGTON — September 2017 was the beginning of the end. That’s when Equifax disclosed publicly,…

published 03 - March - 2019
Read More
Other

Information Security Forum Report Examines How to Deliver an Effective Cyber Security Exercise

The Information Security Forum (ISF), trusted resource for executives and board members on cyber security…

published 27 - February - 2019
Read More
Other

Cyber risk reporting: What the board wants

According to the McKinsey report The Board Perspective (March 2018) performance management and risk management…

published 22 - February - 2019
Read More
Other

Cybersecurity Plan

Writing a basic security plan is a must for all businesses, regardless of size. For…

published 19 - February - 2019
Read More
DICE

Cyber Insurance: Time for CIOs to invest?

The threats to your business keep coming. Last year was the second-most-active year for data…

published 18 - February - 2019
Read More
Other

What CEOs Need to Know About the Future of Cybersecurity

Until recently, Chief Executive Officers (CEOs) received information and reports encouraging them to consider information…

published 16 - February - 2019
Read More
Other

Cybersecurity and the C-Suite: What Executives Need to Know

Until recently, CEOs received information and reports encouraging them to consider information and cyber security…

published 13 - February - 2019
Read More
Other

Buzz, Hype, and Shiny Objects - Where to Focus Instead

With all the hype in marketing, some topics get way too much attention, while other —…

published 13 - February - 2019
Read More
Other

Cyber insurance: Is your organisation covered? Is the insurance industry covered?

Cyber insurance remains a popular topic of conversation among security professionals. This is no surprise…

published 08 - February - 2019
Read More
Computer Weekly

Security Think Tank: Focus UTM capabilities on security and business needs

How can organisations best use unified threat management tools to help stem the tide of…

published 07 - February - 2019
Read More
Other

5 Big Data and Cloud Security Concerns to Watch Out for in 2019

As we are growing with technology, security would undoubtedly strike our path. Taking a look…

published 07 - February - 2019
Read More
Other

Steps to Prevent Data Breaches

Normally, it takes around 6-months for an organization to realize that their system is infected…

published 07 - February - 2019
Read More

10 Worrisome Ransomware Predictions for 2019

Ransomware is so last year…or is it? A type of malicious software that threatens to…

published 07 - February - 2019
Read More
Other

Four Things Every CEO Should Know About Cybersecurity

Until recently, Chief Executive Officers (CEOs) received information and reports encouraging them to consider information…

published 05 - February - 2019
Read More
Other

Global security threats organizations must prepare for in 2019

Criminal organizations will continue their ongoing development and become increasingly more sophisticated. In the year…

published 31 - January - 2019
Read More
DICE

Want to Keep Security Talent? Offer Something More.

For years, chief information security officers (CISOs) have viewed talent retention as one of their…

published 31 - January - 2019
Read More
Computer Weekly

Break Free from Traditional Network Security

Today, there is no longer a hard network perimeter. Businesses need to forge close links…

published 25 - January - 2019
Read More
Other

Latest Information Security Forum Digest Looks at Building Tomorrow's Workforce

The Information Security Forum (ISF), the trusted source that senior security professionals and board members turn to…

published 25 - January - 2019
Read More
Other

Information Security Forum Tackles Tomorrow's Security Workforce in Latest Report

The Information Security Forum (ISF), the trusted source that senior security professionals and board members…

published 25 - January - 2019
Read More
Other

Sticking to your Cybersecurity Resolutions in the New Year

The Information Security Forum recommends that businesses focus on the following cyber security topics in…

published 22 - January - 2019
Read More
Other

Is Your 2019 Business Technology Plan Completed?

The new year is already upon us, but it is not too late to put…

published 22 - January - 2019
Read More
Other

The Top 50 Must-Attend Information Security Conferences in 2019

Our list of the top 50 infosec conferences happening around the world in 2019 -…

published 22 - January - 2019
Read More
Computer Weekly

UK Firms Say £6.6bn Annual Security Testing Cost Too High

Avord launches platform to reduce the multibillion-pound annual cyber security testing cost that most UK…

published 22 - January - 2019
Read More
Other

Do We Really Have a Cybersecurity Skills Gap: Time to Refocus the Hiring Process

Is there a cybersecurity skills gap? Plenty of surveys and anecdotal evidence seem to say…

published 22 - January - 2019
Read More
Other

Building Cyber Resilience is Critical as Threats Rise

Given the pace of change and scale of threat in the digital world, Steve Durbin,…

published 18 - January - 2019
Read More
Other

A Diverse Security Workforce is a Stable Security Workforce

When it comes to building an InfoSec team, security executives face a number of challenges,…

published 18 - January - 2019
Read More
Other

With Great Power Comes Great Responsibility: Learning from a major data breach

Are the recent data breaches finally a catalyst for change in how cyber risk is…

published 18 - January - 2019
Read More
Other

Supply Chain Cybersecurity to Evolve in 2019

“Security is only as strong as its weakest link,” Steve Durbin, Managing Director, ISF says.…

published 15 - January - 2019
Read More
Computer Weekly

Security Think Tank: Creative Thinking Key to Meeting Emerging Security Challenges

How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running…

published 14 - January - 2019
Read More
Other

The European: Building the cybersecurity workforce of tomorrow

As the range of cyber threats confronting industry continues to grow more varied, intense and sophisticated,…

published 11 - January - 2019
Read More
Other

New Year's Resolution for 2019: Security must be the top priority for the Board

In the year ahead, organizations must prepare for the unknown so they have the flexibility…

published 07 - January - 2019
Read More
Other

Nine Security Tips for 2019

Cybercrime caused no shortage of sleepless nights in 2018. And in 2019, freelance hackers and…

published 04 - January - 2019
Read More
Other

The European: Building the Cybersecurity Workforce for Tomorrow

In the Winter 2019 edition of the European Magazine, Steve Durbin, Managing Director, ISF explains…

published 04 - January - 2019
Read More
SC Media

Supply and Demand (for security)

2018 was the year that raised the alarm in earnest about potential vulnerabilities in the…

published 03 - January - 2019
Read More
SC Media

Land of the Giants - Cybersecurity in 2018

2018 threw some cybersecurity curve balls but it also looked a lot like 2017…only bigger.…

published 03 - January - 2019
Read More
Other

4 Global Cybersecurity Threats for 2019

In the year ahead, organizations of all sizes must prepare for the unknown, so they…

published 03 - January - 2019
Read More
Other

Prediction: Businesses will continue to have to adapt to government regulations

Says who? “Regulatory frameworks will continue to drive security maturation for companies. Specifically, the European GDPR will…

published 03 - January - 2019
Read More
Other

Farewell 2018, Hello 2019: The last 12 months in cloud - and what's on the horizon

2018 was yet another fascinating year when it came to cloud computing, along with the…

published 03 - January - 2019
Read More
Other

Best Practice Response Can Mitigate Data Breaches Quickly

It takes about six months for a company to detect that a data breach occurred in its…

published 03 - January - 2019
Read More