When executives stay closely involved, from setting the vision to tracking results, they turn AI…
Agentic AI represents a significant advance in artificial intelligence, moving beyond simple content generation to…
While conventional AI remains bound to pre-defined tasks, agentic systems can independently interact with databases,…
As AI systems grow more autonomous and are embedded into high-stakes decisions, such as hiring,…
Agentic AI shifts the conversation about AI from passive tools to autonomous systems that can…
Artificial intelligence has made a fast leap from a specialized technology to a central topic…
Massachusetts lawmakers are finally confronting a reality that parents and educators have long recognized: Our…
AI security governance provides a stable compass, channeling efforts and transforming AI from an experimental…
In situations where AI supports important security tasks like leading investigations and detecting threats and…
In the age of digital-first, organizations are confronted with an unprecedented degree of technological disruption.…
AI agents capable of acting on their own are being deployed to scan networks, launch attacks, and bypass traditional security systems.
Discover how shadow AI risks threaten enterprise security, compliance, and trust, and learn strategies to identify and control hidden AI adoption.
Recent cyberattacks against widely distributed networks have rattled sectors that previously thought themselves immune from attack.
In the high stakes of mergers and acquisitions, financial due diligence is everything. But there’s a critical dimension of risk that is often overlooked, and that is cybersecurity.
Steve Durbin explores why a proposed 10-year freeze on state-level AI regulations could undermine innovation, accountability, and public trust.
Tariff volatility can disrupt supply chains and expose businesses to cyber security threats. Learn how rapid responses to tariff changes may create vulnerabilities for bad actors to exploit.
Discover from Steve Durbin the top 8 strategic concerns CROs face in 2025, from balancing innovation and compliance to managing AI risks and ensuring organisational resilience.
Steve Durbin highlights growing cyber risks as Trump’s executive order fuels new uncertainty in global supply chain security and regulatory expectations.
Steve Durbin unpacks how agentic AI's autonomous capabilities are being exploited by cybercriminals, posing new threats to cybersecurity and reshaping digital risk landscapes.
Explore how evolving trade policies are increasing cyber risks across global supply chains, and what businesses and policymakers can do to mitigate these threats.
Explore five critical security trends transforming enterprise resilience through 2027, from digital identity threats to global data fragmentation and AI-driven risks.
Discover the five essential elements to consider before designing a cyber exercise, ensuring your organization is prepared, resilient, and ready to respond to cyber threats effectively.
Technology is an enabler in countless ways. It has empowered a range of shifts in…
Steve Durbin reveals how malicious actors are developing teams of autonomous AI systems that can evade traditional security measures through techniques like polymorphic code generation and data poisoning.
For an AI agent to “think” and act autonomously, it must be granted agency; that…
Steve Durbin explores the EU's Digital Operational Resilience Act (DORA), highlighting its significance for financial services.
Steve Durbin explores how defensive AI can effectively counteract sophisticated cyber threats in this insightful Forbes article.
Explore the essential building blocks of data security in this insightful feature on Manufacturing.net by Steve Durbin.
Steve Durbin explores impact on global risk management. Learn why CISA cuts are considered a dangerous gamble in an increasingly volatile world.
Explore Steve Durbin's insights on tackling social media disinformation through media literacy, critical thinking, and platform accountability.
Discover how OSINT awareness can mitigate social engineering attacks in Steve Durbin's latest SC Media feature.
Steve Durbin details five key areas where organisations and their risk managers must allocate efforts to navigate these uncertain times.
Paul Watts examines security leadership in a shifting threat landscape, sharing ways to better align cybersecurity with business goals.
Callum Moore explores the role of cyber simulation exercises in cyber resilience and how to gain buy-in from corporate leaders.
Steve Durbin guides organisations on ensuring that the usage and adoption of AI is managed in a secure, ethical and responsible manner.
Discover the seven key trends shaping cyber threats and risk management for 2025, as outlined by Steve Durbin.
Explore with Steve Durbin the top cybersecurity concerns for boardrooms, from data breaches to AI-powered threats.
Discover from Steve Durbin how your organisation can defend against increasing cyber threats from state-backed adversaries.
Featured in Forbes, ISF CEO Steve Durbin shares his guidance on how security leaders can enable the board to make informed security decisions.
Featured in Forbes, ISF CEO Steve Durbin explores the impact and influence of social media in shaping opinions and disseminating news.
ISF CEO Steve Durbin explores some of the top risks, concerns, and uncertainties on the horizon for quantum computing.
Research shows that only 3% of businesses have developed true resilience against cyber threats. ISF CEO Steve Durbin shares primary reasons for this disparity.
ISF Expert Richard Absalom explores why organisations need to move beyond awareness; sharing guidance on how to focus on security culture instead.
Steve Durbin shares seven recommendations on how organisations should approach their awareness and security culture programs.
ISF CEO Steve Durbin shares five strategies on how board members can better manage and govern cyber security.
Steve Durbin, ISF Chief Executive shares his thoughts on why organisations need a BISO and what traits are ideally suited for the role.
Steve Durbin, ISF CEO shares 5 important factors to consider when trying to mitigate and counterbalance business impact of technology failures
ISF CEO Steve Durbin shares his best practices on how security leaders can develop a positive brand and culture for cyber security.
Featured in Security Boulevard, ISF CEO, Steve Durbin shares recommendations on how to balance business growth with risk management.
Featured in Forbes, ISF CEO Steve Durbin explains how you can maximise value from existing cybersecurity investments to inform strategy.
ISF Head of Research, Paul Holland outlines the essential steps to ensure your organisation is well-positioned for cyber resilience.
ISF CEO Steve Durbin explains why rise of cybercrime-as-a-service amongst other trends, are lowering entry barriers for criminals.
ISF Head of Tools & Methodologies, Alex Jordan shares his expert opinion on managing extinction level risks associated with suppliers.
Over the last decade, OSINT (open-source intelligence) became a buzzword across many industries and lines…
SEC risk management and disclosure rules can be fraught with difficulties. Steve Durbin, chief executive of the ISF, offers advice for coping.
ISF Head of Research, Paul Holland shares his expert opinion on incident preparedness and overcoming extinction level attacks.
"It’ll never happen to us." Most security and risk practitioners have faced this argument at…
Featured in Forbes, ISF CEO Steve Durbin breaks down the SEC material incident disclosure and enhanced governance requirements.
Featured in Security Boulevard, ISF CEO Steve Durbin underscores how organisations can find value in predictive and GenAI implementation.
Interviewed by The European, ISF CEO, Steve Durbin shares the ISF perspective on implementing an effective cyber strategy
ISF CEO Steve Durbin shares seven core elements that can lay the groundwork for a healthy cybersecurity posture.
Featured in Dark Reading, ISF CEO, Steve Durbin shares key takeaways from the event, with guidance on practicing good information governance.
ISF Distinguished Analyst, Paul Watts features in InfoRisk Today to share his perspectives on balancing cyber risk and business goals.
Featured in Help Net Security magazine, ISF CEO Steve Durbin outlines the importance aligning AI's ethics with society’s fundamental values.
Steve Durbin, ISF CEO, shares insights into the looming AI-security threats from his interview with Brian Lord, CEO of Protection Group International.
Featured in Infosecurity Magazine, Distinguished ISF Analyst Paul Watts, shares his views on resilience and effective cyber crisis management.
Steve Durbin, ISF CEO, shares five key elements required to design cyber simulation exercises aimed at enhancing cyber resilience.
ISF CEO Steve Durbin explores the major risks AI poses for today and for the future, and how we can address and mitigate these threats.
Steve Durbin, ISF CEO, shares five best practices on how security leaders can justify the business value of cybersecurity and improve alignment with business goals
ISF CEO Steve Durbin features in Forbes to share some of the top risks organisations need to be prepared for; impact of geopolitics on supply chains, environmental challenges of quantum computing and more.
ISF CEO STEVE Durbin featured in Helpnet Security to share his insights on how to design and develop an effective cyber simluation exercise.
ISF CEO Steve Durbin featured in Dark Reading to provide guidance on 5 key areas security leaders must navigate to cushion the blow of geopolitical conflicts.
Steve Durbin featured in CSO online, sharing his six steps on how organisations can create risk assessment plans to anticipate future threats.
Discover what the latest updates to the NIST CSF mean for your organisation as Head of Tools at the ISF, Alex Jordan, provides his thoughts.
ISF Chief Executive Steve Durbin, features in Forbes to outline six essential steps for security leaders to enhance their cyber readiness.
ISF Chief Executive Steve Durbin, features in Helpnet Security to address three cyber security hurdles in 2024 - Data, AI and Regulation.
Paul Watts, Distinguished Analyst at the ISF explores what the SEC indictment of SolarWinds means for security leadership
Organizations in "essential" sectors have until October 2024 to comply with the Network and Information…
Recent global events such as the pandemic have allowed security leaders to showcase the potential…
With inflationary pressures mounting and downturn fears hovering, it’s natural for organizations to scale back on their overall…
Security is not a primary area of expertise for most organizations so preparedness may fall…
Industrial control systems (ICS) such as programmable logic controllers, distributed controls systems, SCADA systems, and operational…
Data is the most durable, limitless commodity driving future economies and offering fresh insights for…
The agile project management philosophy values speed, collaboration, communication, and interaction. Here are some best…
The fourth industrial revolution is here, and new technologies have the potential to change how…
Cyber security staffing shortages are being driven by issues such as burnout, a lack of…
I predict that for cybersecurity leaders, 2023 will not be an easy year. On the…
Paul Holland shares his thoughts on protecting and securing the integrity and confidentiality of information within OT environments.
Globalization and hyperconnectivity has made the world more interconnected and interdependent than ever before. The…
The inaugural Security Middle East Conference was a major success for the security community. Over…
Steve Durbin contributes to InformationWeek to chart the course for the responsible use of artificial intelligence.
Cybersecurity teams are struggling to find the right talent, with the right skills, and to…
Steve Durbin outlines how choosing the right cloud cyber security framework can strengthen resilience across your entire cloud supply chain.
Paul Holland provides insight into a possible new threat to operational technology environments, specifically those in the energy sector.
Steve Durbin delves into the key challenges organisations should address in building resilience against supply chain risks.
Steve Durbin discusses the potential risks and challenges organisations could face as they increasingly build, use or rely on AI technologies.
Dan Norman, Regional Director, EMEA for the ISF, looks at the challenges and opportunities Saudi…
Outgoing employees pose significant security risks to organizations. Here are some of the major issues…
Steve Durbin explores steps to developing a human-centred security program that engages your workforce to better protect your organisation.
Dan Norman predicts cybersecurity trends that are set to accelerate for the Middle East in 2023.
Steve Durbin offers advice on what strategies can be taken to make information security better connected to organisational goals and strategy.
Steve Durbin features in TechTarget to offer insight into engaged governance and the six principles that organisations should implement.
Paul Watts explores the shifting nature of business, the role of the security leader, and the impact of not aligning to each other’s goals.
Steve Durbin explores the ways security teams can best measure, analyse and report cyber security threats and performance
Richard Absalom explores the soft skills needed to navigate boardroom politics, ensuring measurements support decisions and drive action.
Steve Durbin offers insight into how organisations can get on the path to developing a coherent security strategy.
Paul Watts, Distinguished Analyst for the ISF featured in Tanium magazine to share his thoughts on how security professionals can demonstrate value by adopting a shift-left mentality – a proactive stance for security that allows companies to become more agile and able to innovate.
With cyber security becoming riskier, costlier and more complicated, Steve Durbin explores four key challenges to look out for in 2023.
As vendor risk emerges as a top security priority, Steve Durbin provides tips you can adopt today to better manage your supply chains.
Steve offers actionable guidelines to building and maintaining the skills and relationships that can take security leaders to the next level.
Dan Norman explores how you can create a steady stream of meaningful data that is actually relevant to your organisation.
Paul Watts details what you should be focussing on when thinking about business resiliency in the context of ransomware.
Steve Durbin offers his thoughts on how enterprises can make the most out of threat intelligence for smarter security.
Human behaviour is one of the biggest challenges faced by security practitioners, leaders and cyber risk managers today.
A background to the current state of threat intelligence, and practical guidance for security teams at all stages of its implementation.
Threat actors are predicted to weaponise industrial control systems in order to harm or kill humans by 2025 - how should you prepare?
Steve Durbin discusses the cyber best practices and security controls you should be implementing now to mitigate the threat of deepfakes.
Steve Durbin featured in Forbes to shed light on the best practices you should consider to better protect ICS environments.
Steve Durbin offers recommendations for organisations to mitigate the potential risks and manage the ethical adoption of AI.
Steve Durbin offers advice on how you can prevent the dilution of enterprise value and trust in the eyes of your stakeholders.
As risks increase with the world becoming more digital, regulated, and interconnected, Steve Durbin offers steps to reduce their impact.
Paul Watts questions whether cyber insurance is a must-have item, an expensive luxury, or the emperor’s new clothes.
Steve Durbin features in Dark Reading to discuss three major cyber threats that could result from today's hasty technology decisions.
Francesca Williamson shares insight on how you can detangle the complexities of the supply chain and create better security practices.
Steve Durbin discusses three dirty data cyber security concerns, and how organisations can protect themselves against these emerging threats.
Steve Durbin featured in Forbes to highlight key cyber security dimensions to consider when entering the merger and acquisition process.
Steve Durbin features in the World Economic Forum, offering considerations to consider when evaluating cyber incident response capabilities.
Steve explains the five steps organisations can take to help mitigate potential threats against the supply chain and be better armed.
Steve explains how you can prepare against unintended consequences of cyber regulations, no matter how well-intentioned they might be.
Steve Durbin deconstructs Zero Trust; explaining how it works, what the common misconceptions are, and what to consider before implementation.
Steve Durbin outlines steps organisations and security teams can use to understand and prepare for potential threats in times of instability.
Steve Durbin offers advice on the M&A process: how you can mitigate risk and highlight to leadership the value of information security.
ThoughtLab's press release for their study, providing evidence-based insights into the most effective cybersecurity practices and investments.
Steve Durbin expands upon the risks, not only to individuals and businesses, but also to nations as 5G technologies transform communications.
Steve Durbin outlines how CISOs can shift from being reactive to proactive, improving the overall resilience of their organisation.
Steve Durbin breaks down each element of the cybersecurity framework presented in the recently released report led by the ISF with CC-Driver.
Dan Norman looks at what needs to be considered when evaluating the risks involved in an organisation’s security strategy.
The omission of the word ‘security’ from the title of the UK government’s new National Cyber Strategy is a telling one.
Read as Steve explores the technological risks that may lead to crises in the next decade in his latest article for Forbes.
Emma Bickerstaffe explores what makes a good security training programme and questions buyers should ask when procuring training as a service.
Daniel Norman, ISF Senior Solutions Analyst, takes a closer look at 'Human-Centred Security' and how to achieve it.
Dan Norman discusses the security challenges ahead with the continued shift to smart cities becoming an attractive target for cyber attackers.
Discussing key pervasive cyber threats for 2022, Steve Durbin's recent Forbes article presents a strong foundation for security teams.
Read Steve Durbin's latest article addressing the most common ransomware attack techniques whilst offering guidance on their prevention.
Read Steve Durbin's latest article highlighting the impact of the unconscious mind upon cybersecurity vulnerabilities.
Paul Watts features in this Computer Weekly article aimed at helping security professionals lead with knowledge, rather than react with fear.
Read Emma Bickerstaffe's latest article for Computer Weekly as she offers CISO's food-for-thought following the pandemic.
By now Members will be very familiar with the concern around the 'log4j 2' remote code execution vulnerability; Apache's java-based logger library also known as 'Log4Shell'. This vulnerability is filed as CVE-2021-44228 in the NIST National Vulnerability Database.
Cybercrime is a major threat to every industry and organization in the world. No wonder global entities are desperately seeking a silver bullet that can somehow neutralize cybersecurity threats.
As a relatively nascent technology that is getting a lot of publicity, dissecting the true…
Maritime cyber security is an emerging issue that requires immediate attention, according to the International Maritime Organization (IMO). Feedback received from global shipping professionals indicate that a common threat to the industry, such as cyber security, is dealt with differently among industry practitioners around the globe.
Paul Watts, distinguished analyst, contributes to how ransomware has managed to retain its high profile in cybercrime for Computer Weekly.
By Steve Durbin, Chief Executive of the ISF. Zero trust isn't a silver bullet, but…
Chronis Kapalidis, Principal at the ISF featured in WSJ. Many of the cybersecurity gaps outlined…
Here are five questions to help determine if your company needs cyber coverage. The cyber…
To pay or not to pay? Notwithstanding the ethical and emerging federal legal liability issues…
Zero trust is a strategy organisations will need to look at implementing in the same…
Dan Norman, senior solutions analyst at the Information Security Forum, guides us through the key…
It is important to recognise that although setting out a policy and process for RD…
Given the high stakes, security should be at the forefront of 5G rollout plans At…
The speed of the outage and the protracted nature of the recovery bears all of…
The number of devices and associated challenges are far too many. IIoT devices possess limited…
As the UK chases a Brexit dividend to open up non-EU markets to UK businesses…
For more advanced, sophisticated supply chains, it’s about continually going back over it to increase…
AI systems and can be entrenched by programmers or specific data sets. Unfortunately, if this…
Until now, there were limitations on some of the heavier network related devices like virtual…
From a security perspective, what are the personal apps/app types that you think CISOs should…
there is a misbelief that ships are not vulnerable to cyber incidents, leading to an…
...the sheer volume and velocity of 5G networks, combined with the complex infrastructure and heavy…
Ransomware will proliferate over the coming years, with attackers locking individuals into, or out of,…
Containerization has effectively become the new normal for expediting app delivery and improvements; security concerns…
Organisations often have the best of intentions when creating some of these types of software,…
Perhaps the biggest change that CISOs need to accept is that hybrid working is how…
Speed and accuracy in identifying and responding to threats are the alluring promises of automated…
Develop a holistic backup strategy that covers all systems and core infrastructure services. Steve Durbin,…
The pandemic has caused a tectonic shift in how we live and work. Many companies…
By Steve Durbin, Chief Executive of the ISF As organizations claw their way back from…
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses…
Ultimately, a well-designed security architecture will enhance understanding, simplify decision-making, improve efficiency and contain costs.…
Satellites support so much of our business infrastructure, but being in space doesn't make them…
Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the…
First party cookies are really useful. For instance, they mean you don’t have to log…
Distinguished Analyst Andy Jones and Senior Analyst Alex Jordan, both of the ISF, take opposing…
The mass migration of people out of the workplace and into the home prompted a sharp rise in cybersecurity incidents.
Building resilience and agility into a supply chain to cope with fluctuations in demand and meet business goals is a major challenge.
By Steve Durbin, Chief Executive of the ISF Coping with heightened operational risk during a…
In the first of his regular new information security columns for Security Middle East, Daniel…
The first nation state to develop technologies such as AI, 5G, robotics and quantum computing…
Highly connected ecosystems of digital devices will enable the harvest, repurpose and sale of sensitive…
Interview with Steve Durbin, Chief Executive of the ISF and The European The combination of…
While many organizations have a security awareness training program in place, few trigger real behavior change or...
By Steve Durbin, Chief Executive of the ISF Make security a core consideration in procurement…
The idea that technology can solve all our problems is seductive. It seems like every product vendor claims to...
By Jordon Kelly, Research Analyst at the ISF Of his new national security appointments, president…
By Steve Durbin, Chief Executive of the ISF You need to establish continuous monitoring across…
With the pandemic precipitating a health crisis that continues to threaten the global economy and the real possibility of a...
Many people can become good leaders. After all, you can learn how to communicate and how to be a better listener; you can...
By Steve Durbin, Chief Executive of the ISF With the pandemic precipitating a rapid acceleration…
By Steve Durbin, Chief Executive of the ISF Cybersecurity should sit at the core of…
By Paul Holland, Principle Research Analyst at the ISF Home working assumes a certain level…
organizations should in particular note the extent of fines levied by regulators for infringements that…
By Steve Durbin, CEO of the Information Security Forum, and Forbes Business Council Member Building…
By Steve Durbin, CEO of the ISF Maturing your organization’s ability to detect intrusions quickly…
All the social techniques cybercriminals currently employ could be improved immeasurably with the help of…
By Steve Durbin, CEO of the ISF Business leaders will inevitably need to make difficult…
By Steve Durbin, CEO of the ISF Leading the enterprise to a position of readiness,…
By Steve Durbin, Managing Director of the ISF. There may be no better way to…
One area that organizations need to deal with is the rise of the insider threat,…
With 2020 coming to a close, SC Media is delivering through a series of articles…
The insider threat is one of the greatest drivers of security risks that organizations face…
How can security keep pace with a cyber threat landscape that rapidly becomes more sophisticated…
By Daniel Norman, Senior Solutions Analyst at the ISF A large portion of IoT-related breaches…
Attackers will continue to be presented with the tools and opportunities to target and exploit…
The success of ransomware is reliant on whether or not the target organization has patched…
By Steve Durbin, Managing Director, Information Security Forum, and Forbes Business Council Member Ransomware, phishing,…
Payment of a ransom is also a contentious discussion – in many cases the ransom…
Technology and processes should complement behavior, not add friction and impede productivity... Steve Durbin, Managing…
I, for one, am wary if a website asks me, unprompted, to download anything. It…
Also, beware of email “offers” from companies you don’t recognize and even those that you…
A human-centered security program helps organizations to understand their people and carefully craft initiatives that…
As a starting point, an individual will always choose to be productive in their current…
A typical strategy should aim to reduce the number of security incidents and improve the…
The Information Security Forum (ISF), the trusted source that senior security professionals and board members…
Errors and acts of negligence can cause significant financial and reputational damage to an organization,…
Errors and acts of negligence can cause significant financial and reputational damage to an organization...…
Organizations should have an incident response or crisis management plan for ransomware events, knowing who…
Apprenticeships, on the job learning, backed up with support training packages are the way to…
The global COVID-19 pandemic has forced digital change on organizations at high speed and certainly…
Just as consumers now automatically accept cookies and agree to privacy policies, they may also…
Privacy should also be a high priority for anyone handling sensitive information, considering the shift…
Basic cyber hygiene standards need to be met, covering patching and updates, network segmentation, network…
The [pandemic] accelerated and concentrated forces, such as the move to remote working and adoption…
Cross training within an organization is a good method of closing the skills gap by…
The healthcare services have an outdated approach to security awareness, education, and training... Daniel Norman,…
All infosec teams have been under huge pressure lately and good CISOs acknowledge that and…
...overdependency on untested technologies, new vulnerabilities in systems, poorly constructed policies and a lack of…
By Steve Durbin, Managing Director of the ISF and Forbes Business Council Member Once expectations are…
Anyone with access to the Dark Web can buy readily available ransomware kits for less than $100.…
Creating a cyber-savvy workforce that takes information security seriously, while nurturing a culture of trust,…
As we come out of lockdown and start to negotiate the economic fallout it has…
The attacking state will build user profiles, understand patterns of behavior and then they will…
By Steve Durbin, Managing Director of the ISF AR promises much, but organizations will soon…
We live in an uncertain world where budgets and resources are tight, yet the need…
...individuals should proactively try and seek out vulnerability forums online and regularly assess whether exploits…
Increasingly, lockdown has driven us all online and the training industry has been somewhat slow…
Non-security incidents can have a substantial knock-on effect within the information security spectrum Steve Durbin,…
By Daniel Norman, Senior Solutions Analyst at the Information Security Forum. Frequently delivering micro-content, using…
The best security policies are under constant review and take into account ongoing feedback. Archaic…
By helping staff understand how vulnerabilities can lead to poor decision making and errors, organizations…
Being a next-generation CISO is an extremely rewarding position that allows an individual to become…
Attackers will once again turn their attention to disrupting the health service by targeting poorly…
This is an exciting time for the healthcare industry but it is also dangerous. As…
By Steve Durbin, Managing Director of the Information Security Forum, and Forbes Business Council Member…
Shortages in skills and capabilities are being revealed as major security incidents damage organizational performance…
Smart home devices, such as Ring, collect an inordinate amount of sensitive personal data in…
As data breaches increase, many will be the result of Insider threats. In fact, the…
Typically, the success of ransomware is reliant on whether or not the target organization has…
As digital transformation drives organizations to become more agile and responsive, the CISO faces demands…
By Steve Durbin, Managing Director, Information Security Forum As we head into Cybersecurity Awareness Month…
Becoming a next-generation CISO requires an individual to embrace and master new skills and disciplines,…
By Steve Durbin, Managing Director, Information Security Forum, and Forbes Business Council Member A rapid…
That datacentre security is a complex subject is not in doubt and, given the trend…
Organizations will have to adapt quickly to survive when digital and physical worlds collide. By…
“Ransomware is one of the most prevalent threats to an organization’s information and is more…
“In today’s COVID-19 reality, to rectify the continued cyber skills shortage, organizations are being encouraged…
"Ransomware attackers are not interested in stealing assets and using them to cause damage, but…
By Steve Durbin, Managing Director, ISF and Forbes Business Council Member The continuing rollout of…
“Employees subject to new working arrangements may well react maliciously due to limited hours, lowered compensation,…
“Increasingly, lockdown has driven us all online and the training industry has been somewhat slow…
With data collection growing, and increased concern about how it is handled, a synergy between…
By Steve Durbin, Managing Director, ISF Current attacks will continue to be refined, and what…
By Steve Durbin, Managing Director, ISF and Forbes Business Council Member The business world is…
By Steve Durbin, Managing Director, ISF The Internet of Things (IoT) infrastructure will soon become…
"The challenge for security is to be able to translate security metrics into a form…
Artificial intelligence and machine learning techniques are said to hold great promise in security, enabling…
By Steve Durbin, Managing Director, ISF The digital and physical worlds are on an irreversible…
Schrems II “Was always going to be a major test for the Privacy Shield,” Steve…
By Steve Durbin, Managing Director, ISF In the coming years, advanced deepfakes of high-profile individuals…
By Steve Durbin, Managing Director, ISF Over the next few years, the first truly digital…
Adopting containers promises great organisational efficiency advantages, but the fast-evolving technology can be problematic for…
“Security leaders will need to adapt, swiftly, to speaking the language of the business in…
Open Source Software is becoming much more commonplace within organizations, bringing a different set of…
By Daniel Norman, Research Analyst, ISF The healthcare industry has been under immense pressure during…
The risk and severity of cyber-attacks have increased over the past few years. In recent…
In the coming years, extreme weather events will become more frequent and widespread, devastating areas…
Businesses that may be feeling the pinch concerning their income might start by finding ways…
"Organizations whose business model is dependent on behavioral analytics will be forced to backtrack on…
Business leaders are aware of how important it is to be adaptable to survive market…
In the coming years, new technologies will further invade every element of daily life with…
It’s been four months since COVID-19 was declared a global pandemic by the World Health Organization (WHO).…
In the coming years, internet of things (IoT) infrastructure will become unmanageable and impossible to…
With coronavirus crisis creating new opportunities for cybercriminals, 70 percent of organizations are seeing the…
Poorly secured robo-helpers will be weaponised by attackers. By Steve Durbin, Managing Director, ISF Over…
Future features include plenty of self-reporting options, and officials’ fears the data could be misused.…
When Smithfield Foods closed its Sioux Falls pork processing plant – joining other meat and…
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working…
VPN, cloud, and phishing misunderstandings show up in myths about security and remote work. Security…
The Information Security Forum (ISF) has published a major update to its Standard of Good Practice (The…
The COVID-19 pandemic has resulted in an upshot of all types of scams. In the…
Senior executives understand that today’s global economy is still not adequately protected against cyberattacks, despite…
As the likes of Google and Apple bolster privacy in the race to come up…
How has the coronavirus impacted the outlook on security over the next few years? The…
“Like other Internet of Things (IoT) devices, drones currently have very poor security controls, making…
Researchers outline cybersecurity threats they predict businesses will face in two years as technology evolves.…
An insider threat is a security risk that originates from within an organization. According to…
A major feature of the current COVID-19 crisis has been the sudden growth of state…
The Information Security Forum (ISF) has released Threat Horizon 2022, the latest in a series of…
The Information Security Forum predicts the coming threats with a very good track record so…
Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects…
“My biggest concern is when remote workers enter phase three since it is unlikely that…
"Criminals have become more sophisticated by considering the psychological aspects of an attack," says Mark…
The number of new people claiming unemployment benefits totaled a staggering 6.648 million last week…
“Ultimately we are being asked to trust our governments in their ability to handle personal…
“Remote working and remote business interactions will identify new opportunities, new ways of working that…
“I suspect that COVID-19 will tighten further the investment criteria being applied with a keener…
As we work remotely and isolate ourselves from friends and colleagues as best we can,…
As the COVID-19 pandemic continues to spread, cybersecurity professionals have never been busier. Despite some reports of cybercriminals…
“Our appetite for information is vast and cybercriminals know this so there may be attachments…
The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues…
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of…
ENTSO-E, the European Network of Transmission System Operators, has announced that it found evidence of…
There just aren't enough certified cybersecurity pros to go around -- and there likely never…
Steve Durbin is a senior security leader at the Information Security Forum (ISF) with a diverse background…
10th March 2020 ISF Coronavirus Update With the growing concerns regarding the Coronavirus (COVID-19) outbreak…
By Steve Durbin, Managing Director of the Information Security Forum. As the cyberthreat landscape becomes…
One of the biggest security threats to your team might be the person working right…
By Steve Durbin, Managing Director, Information Security Forum Cloud computing has become a prevalent force, bringing…
"As pressure from regulatory compliance increases, businesses must take an increasingly integrated and well-rounded approach…
The rise in business processes supported by cloud services has been well evidenced by organizations…
Privacy advocates have long called for a federal privacy law and it’s coming…in the meantime,…
The traditional picture of a hacker is of a script kiddie in a hoodie hunched…
The theme of Data Privacy Day 2020 is “Own Your Privacy.” Data Privacy Day began…
"This debate has been ongoing for some time now and there is clearly a need…
The belief that effective perimeter security is the best way to protect data is a…
"In a hyperconnected world, attack surfaces and interdependencies will grow astonishingly quickly," warns Steve Durbin,…
"Technological advances are not restricted to America and China. They are a global phenomenon both…
How do you know that the critical parts inside your servers and devices are not…
The race to develop strategically important next-generation technology will drive an increase in nation-state-backed attacks.…
In the year ahead, organisations of all sizes must prepare for the unknown, so they…
Artificial Intelligence (AI) is creating a new frontline in information security. Systems that independently learn, reason and…
Humans are often referred to as the “weakest link” in information security. However, organisations have…
It’s that time of year again. Time for every one of us to reminisce on…