You are viewing 19 of 25 results
news

Artificial Intelligence: The Future Of Cybersecurity?

The number of devices and associated challenges are far too many. IIoT devices possess limited…

published 23 - September - 2021
Read More
news

A response to planned data protection changes

As the UK chases a Brexit dividend to open up non-EU markets to UK businesses…

published 07 - September - 2021
Read More
news

An Effective Supply Chain Starts With Security

For more advanced, sophisticated supply chains, it’s about continually going back over it to increase…

published 06 - September - 2021
Read More
news

The Pegasus Spyware Problem

Pegasus spyware, is this a real problem? Spyware is not a new problem and has…

published 01 - September - 2021
Read More
news

How criminals use artificial intelligence to fuel cyber-attacks

AI systems and can be entrenched by programmers or specific data sets. Unfortunately, if this…

published 01 - September - 2021
Read More
news

What CISOs need to know about Wi-Fi 6E

Until now, there were limitations on some of the heavier network related devices like virtual…

published 24 - August - 2021
Read More
news

What are the risks associated with personal, unsanctioned apps on corporate devices and why?

From a security perspective, what are the personal apps/app types that you think CISOs should…

published 24 - August - 2021
Read More
news

Commercial Shipping Is the Next Cybersecurity Challenge

there is a misbelief that ships are not vulnerable to cyber incidents, leading to an…

published 17 - August - 2021
Read More
news

Are 5G Networks Setting The Stage For A New Wave Of Cyberattacks?

...the sheer volume and velocity of 5G networks, combined with the complex infrastructure and heavy…

published 11 - August - 2021
Read More
news

The transport threat

Ransomware will proliferate over the coming years, with attackers locking individuals into, or out of,…

published 29 - July - 2021
Read More
news

Adapting InfoSec for Container Security

Containerization has effectively become the new normal for expediting app delivery and improvements; security concerns…

published 27 - July - 2021
Read More
news

NCSC head champions UK-Israeli cyber relationship amid spyware accusations

Organisations often have the best of intentions when creating some of these types of software,…

published 26 - July - 2021
Read More
news

A return to the office is not a return to normal

Perhaps the biggest change that CISOs need to accept is that hybrid working is how…

published 20 - July - 2021
Read More
news

The Trouble With Automated Cybersecurity Defenses

Speed and accuracy in identifying and responding to threats are the alluring promises of automated…

published 13 - July - 2021
Read More
news

Questions To Ask To Help You Prepare For A Cyberattack

Develop a holistic backup strategy that covers all systems and core infrastructure services. Steve Durbin,…

published 23 - June - 2021
Read More
news

Top 5 cybersecurity challenges in the hybrid office

The pandemic has caused a tectonic shift in how we live and work. Many companies…

published 18 - June - 2021
Read More
news

How a Security Architecture Can Keep Your Organization Upright Amid Future Upheaval

By Steve Durbin, Chief Executive of the ISF As organizations claw their way back from…

published 18 - June - 2021
Read More
news

Time to accept printers will leak data

Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses…

published 14 - June - 2021
Read More
news

Designing and Building a Security Architecture

Ultimately, a well-designed security architecture will enhance understanding, simplify decision-making, improve efficiency and contain costs.…

published 10 - June - 2021
Read More
news

Watch this space

Satellites support so much of our business infrastructure, but being in space doesn't make them…

published 02 - June - 2021
Read More
news

Ransomware Is Everywhere — Here’s What You Need To Consider

Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the…

published 01 - June - 2021
Read More
news

What the FLoC? Everything you need to know about Google’s new ad tech that aims to replace third-party cookies

First party cookies are really useful. For instance, they mean you don’t have to log…

published 19 - May - 2021
Read More
news

The case for vaccine passports: the real world versus the digital world

Distinguished Analyst Andy Jones and Senior Analyst Alex Jordan, both of the ISF, take opposing…

published 11 - May - 2021
Read More
news

Threat Horizon 2023: Four Evolving Threats That Should Be On Your Radar

The mass migration of people out of the workplace and into the home prompted a sharp rise in cybersecurity incidents.

published 30 - April - 2021
Read More
news

The Challenge Of Continuous Assurance For Supply Chains

Building resilience and agility into a supply chain to cope with fluctuations in demand and meet business goals is a major challenge.

published 19 - April - 2021
Read More
news

6 Tips for Managing Operational Risk in a Downturn

By Steve Durbin, Chief Executive of the ISF Coping with heightened operational risk during a…

published 16 - April - 2021
Read More
news

How Cyber Security Criminals Exploit the 'Accidental Insider'

In the first of his regular new information security columns for Security Middle East, Daniel…

published 14 - April - 2021
Read More
news

Eurasia Risks 2021 - Global Cyber Crisis

The first nation state to develop technologies such as AI, 5G, robotics and quantum computing…

published 12 - April - 2021
Read More
news

Eurasia Risks 2021 - Digital Totalitarianism

Highly connected ecosystems of digital devices will enable the harvest, repurpose and sale of sensitive…

published 12 - April - 2021
Read More
news

The new reality of a world online

Interview with Steve Durbin, Chief Executive of the ISF and The European  The combination of…

published 06 - April - 2021
Read More
news

How To Develop A Human-Centered Security Program

While many organizations have a security awareness training program in place, few trigger real behavior change or...

published 25 - March - 2021
Read More
news

How Retailers Can Tackle Supply Chain Data Risk

By Steve Durbin, Chief Executive of the ISF Make security a core consideration in procurement…

published 16 - March - 2021
Read More
news

Technology Is Just A Tool: Why People Are The Heart Of Everything We Do In Business

The idea that technology can solve all our problems is seductive. It seems like every product vendor claims to...

published 01 - March - 2021
Read More
news

Security Think Tank: Towards a united state of security

By Jordon Kelly, Research Analyst at the ISF Of his new national security appointments, president…

published 17 - February - 2021
Read More
news

Three Steps to Securing Supply Chains Under Pressure

By Steve Durbin, Chief Executive of the ISF  You need to establish continuous monitoring across…

published 15 - February - 2021
Read More
news

Eight Cyber Challenges In An Uncertain World

With the pandemic precipitating a health crisis that continues to threaten the global economy and the real possibility of a...

published 10 - February - 2021
Read More
news

Six Ways A Good Leader Can Become A Great Leader

Many people can become good leaders. After all, you can learn how to communicate and how to be a better listener; you can...

published 09 - February - 2021
Read More
news

Cybercrime to Scale New Heights in 2021: What Can You do About it?

By Steve Durbin, Chief Executive of the ISF With the pandemic precipitating a rapid acceleration…

published 08 - February - 2021
Read More
news

Words of advice for President Biden’s new CISO

By Steve Durbin, Chief Executive of the ISF Cybersecurity should sit at the core of…

published 04 - February - 2021
Read More
news

Look for GDPR fines to increase, extend beyond breaches

organizations should in particular note the extent of fines levied by regulators for infringements that…

published 25 - January - 2021
Read More
news

Five Threat Vectors Destined To Make Waves In 2021

By Steve Durbin, CEO of the Information Security Forum, and Forbes Business Council Member Building…

published 20 - January - 2021
Read More
news

New Year’s Resolutions for the Board in 2021

By Steve Durbin, CEO of the ISF Maturing your organization’s ability to detect intrusions quickly…

published 13 - January - 2021
Read More
news

AI’s Two Achilles’ Heels Keep Me Up at Night

All the social techniques cybercriminals currently employ could be improved immeasurably with the help of…

published 11 - January - 2021
Read More
news

Cybersecurity Must Be the Top Priority for the Board in 2021

By Steve Durbin, CEO of the ISF Leading the enterprise to a position of readiness,…

published 07 - January - 2021
Read More
news

10 Benefits of Running Cybersecurity Exercises

By Steve Durbin, Managing Director of the ISF. There may be no better way to…

published 06 - January - 2021
Read More
news

2020 Work-for-Home Shift: What We Learned

One area that organizations need to deal with is the rise of the insider threat,…

published 05 - January - 2021
Read More
news

Privacy 2020: From Prepared to Alarmed, the Year the Rubber Hit the Road

With 2020 coming to a close, SC Media is delivering through a series of articles…

published 04 - January - 2021
Read More
news

Cybersecurity in 2021: 5 Trends Security Pros Need to Know

The insider threat is one of the greatest drivers of security risks that organizations face…

published 21 - December - 2020
Read More
news

ISF Proposal for “Human-Centered Security” Focuses Security Awareness on People’s Interactions With Technology

How can security keep pace with a cyber threat landscape that rapidly becomes more sophisticated…

published 18 - December - 2020
Read More
news

Practical tips and advice for personal IoT security

By Daniel Norman, Senior Solutions Analyst at the ISF A large portion of IoT-related breaches…

published 18 - December - 2020
Read More
news

Top Global Security Threats Organizations Will Face in 2021

Attackers will continue to be presented with the tools and opportunities to target and exploit…

published 17 - December - 2020
Read More
news

Ransomware attacks target backup systems, compromising the company ‘insurance policy’

The success of ransomware is reliant on whether or not the target organization has patched…

published 16 - December - 2020
Read More
news

Eight Steps To Building A Human-Centered Security Culture

By Steve Durbin, Managing Director, Information Security Forum, and Forbes Business Council Member Ransomware, phishing,…

published 15 - December - 2020
Read More
news

Conti Gang Hits IoT Chipmaker Advantech with $14M Ransom Demand

Payment of a ransom is also a contentious discussion – in many cases the ransom…

published 11 - December - 2020
Read More
news

New Information Security Forum Research Explores Human-Centered Security

Technology and processes should complement behavior, not add friction and impede productivity... Steve Durbin, Managing…

published 07 - December - 2020
Read More
news

Websites Requiring Security Software Downloads Opened Door to Supply Chain Attack

I, for one, am wary if a website asks me, unprompted, to download anything. It…

published 07 - December - 2020
Read More
news

CISA Warns Public About Online Holiday Shopping Scams

Also, beware of email “offers” from companies you don’t recognize and even those that you…

published 04 - December - 2020
Read More
news

Changing Employee Security Behavior Takes More Than Simple Awareness

A human-centered security program helps organizations to understand their people and carefully craft initiatives that…

published 03 - December - 2020
Read More
news

Why Security Awareness Training Should Be Backed by Security by Design

As a starting point, an individual will always choose to be productive in their current…

published 02 - December - 2020
Read More
news

Information Security Forum Research Dives Into the Need for Human-Centered Security

A typical strategy should aim to reduce the number of security incidents and improve the…

published 01 - December - 2020
Read More
news

Human-Centred Approach is Key to Better Security

Errors and acts of negligence can cause significant financial and reputational damage to an organization,…

published 27 - November - 2020
Read More
news

Organizations Should Use Psychology to Promote Secure Behavior Among Staff

Errors and acts of negligence can cause significant financial and reputational damage to an organization...…

published 27 - November - 2020
Read More
news

Qbot Banking Trojan Now Deploying Egregor Ransomware

Organizations should have an incident response or crisis management plan for ransomware events, knowing who…

published 26 - November - 2020
Read More
news

Cybersecurity Workforce Study Needs to be Taken with a Pinch of Salt

Apprenticeships, on the job learning, backed up with support training packages are the way to…

published 25 - November - 2020
Read More
news

Remote Work in 2021: Cybersecurity Grows in Importance

The global COVID-19 pandemic has forced digital change on organizations at high speed and certainly…

published 23 - November - 2020
Read More
news

Apple to Deliver ‘Privacy Labels’ for Apps, Revealing Data-Sharing Details

Just as consumers now automatically accept cookies and agree to privacy policies, they may also…

published 20 - November - 2020
Read More
news

CISA: Ransomware Activity Targeting the Healthcare and Public Health Sector

Privacy should also be a high priority for anyone handling sensitive information, considering the shift…

published 19 - November - 2020
Read More
news

Imminent Cyberthreat Could Disrupt Hundreds of US Healthcare Systems

Basic cyber hygiene standards need to be met, covering patching and updates, network segmentation, network…

published 16 - November - 2020
Read More
news

Skills Shortage Rains on Cloud Advances

Cross training within an organization is a good method of closing the skills gap by…

published 16 - November - 2020
Read More
news

FBI: Hospitals and Healthcare Providers Face Imminent Ransomware Threat

The healthcare services have an outdated approach to security awareness, education, and training... Daniel Norman,…

published 11 - November - 2020
Read More
news

What Skills Will Cybersecurity Leaders Want in 2021?

All infosec teams have been under huge pressure lately and good CISOs acknowledge that and…

published 10 - November - 2020
Read More
news

Three Common Digital Transformation Challenges — And How To Overcome Them

By Steve Durbin, Managing Director of the ISF and Forbes Business Council Member Once expectations are…

published 05 - November - 2020
Read More
news

Why ransomware has become such a huge problem for businesses

Anyone with access to the Dark Web can buy readily available ransomware kits for less than $100.…

published 04 - November - 2020
Read More
news

Norway Alleges Russia Orchestrated Parliament Email Hack

The attacking state will build user profiles, understand patterns of behavior and then they will…

published 30 - October - 2020
Read More
news

Why Organizations Should Be Wary of the Security Risks Posed by Augmented Reality

By Steve Durbin, Managing Director of the ISF AR promises much, but organizations will soon…

published 29 - October - 2020
Read More
news

ISF Supports Cyber and Compliance Challenges with Launch of Aligned Tools Suite 2020

We live in an uncertain world where budgets and resources are tight, yet the need…

published 28 - October - 2020
Read More
news

#NCSAM: How Can Consumers Boost the Security of IoT Devices?

...individuals should proactively try and seek out vulnerability forums online and regularly assess whether exploits…

published 27 - October - 2020
Read More
news

Cybersecurity, Cloud Skills: Key to Companies’ Digital Transformation

Increasingly, lockdown has driven us all online and the training industry has been somewhat slow…

published 26 - October - 2020
Read More
news

How the Enterprise Can Shut Down Cyber Criminals and Protect a Remote Staff

Non-security incidents can have a substantial knock-on effect within the information security spectrum Steve Durbin,…

published 22 - October - 2020
Read More
news

Six core characteristics that next-generation CISO’s exhibit

Being a next-generation CISO is an extremely rewarding position that allows an individual to become…

published 16 - October - 2020
Read More
news

UHS Hospitals hit by Ryuk ransomware, forced to shut down systems

Attackers will once again turn their attention to disrupting the health service by targeting poorly…

published 15 - October - 2020
Read More
news

How Criminals Use Artificial Intelligence To Fuel Cyber Attacks

By Steve Durbin, Managing Director of the Information Security Forum, and Forbes Business Council Member…

published 14 - October - 2020
Read More
news

Research: Cloud Skills and Solutions Are in Short Supply

Shortages in skills and capabilities are being revealed as major security incidents damage organizational performance…

published 13 - October - 2020
Read More
news

Suspected Ransomware Takes Out Major US Healthcare Provider

Privacy should also be a high priority for anyone handling sensitive information, considering the shift…

published 12 - October - 2020
Read More
news

Ring’s Flying In-Home Camera Drone Escalates Privacy Worries

 Smart home devices, such as Ring, collect an inordinate amount of sensitive personal data in…

published 08 - October - 2020
Read More
news

Insider vs. Outsider Data Security Threats: What’s the Greater Risk?

As data breaches increase, many will be the result of Insider threats. In fact, the…

published 06 - October - 2020
Read More
news

Georgia Election Data Hit in Ransomware Attack

Typically, the success of ransomware is reliant on whether or not the target organization has…

published 03 - October - 2020
Read More
news

Cuts to Digital Security Spending Right Now Would Be a Big Mistake

By Steve Durbin, Managing Director, Information Security Forum As we head into Cybersecurity Awareness Month…

published 01 - October - 2020
Read More
news

What does it take to be a next generation CISO?

Becoming a next-generation CISO requires an individual to embrace and master new skills and disciplines,…

published 30 - September - 2020
Read More
news

Threats from the digital world lead to greater cyber security concerns

Organizations will have to adapt quickly to survive when digital and physical worlds collide. By…

published 21 - September - 2020
Read More
news

5G Brings Benefits, But Also Heralds Fresh Security Threats

By Steve Durbin, Managing Director, ISF and Forbes Business Council Member The continuing rollout of…

published 19 - August - 2020
Read More
news

Cybersecurity Skills Gap Worsens, Fueled by Lack of Career Development

“Increasingly, lockdown has driven us all online and the training industry has been somewhat slow…

published 17 - August - 2020
Read More
news

Why Data Ethics Is a Growing CISO Priority

With data collection growing, and increased concern about how it is handled, a synergy between…

published 11 - August - 2020
Read More
news

The Future's Biggest Cybercrime Threat May Already Be Here

By Steve Durbin, Managing Director, ISF Current attacks will continue to be refined, and what…

published 04 - August - 2020
Read More
news

How To Prepare Your Business As Worldwide Recession Looms

By Steve Durbin, Managing Director, ISF and Forbes Business Council Member The business world is…

published 27 - July - 2020
Read More
news

The Internet Of Forgotten Things Will Leave A Dangerous Legacy

By Steve Durbin, Managing Director, ISF The Internet of Things (IoT) infrastructure will soon become…

published 24 - July - 2020
Read More
news

Quantifying Cyber Risk: Why You Must & Where to Start

"The challenge for security is to be able to translate security metrics into a form…

published 22 - July - 2020
Read More
news

Security Think Tank: Balancing human oversight with AI autonomy

Artificial intelligence and machine learning techniques are said to hold great promise in security, enabling…

published 22 - July - 2020
Read More
news

On the Cybersecurity Horizon: Digital and Physical Worlds Set to Collide

By Steve Durbin, Managing Director, ISF The digital and physical worlds are on an irreversible…

published 21 - July - 2020
Read More
news

EU court kills Privacy Shield, wreaks havoc on digital economy

Schrems II “Was always going to be a major test for the Privacy Shield,”  Steve…

published 17 - July - 2020
Read More
news

Deepfakes will tell true lies

By Steve Durbin, Managing Director, ISF In the coming years, advanced deepfakes of high-profile individuals…

published 14 - July - 2020
Read More
news

Cybersecurity Threats to the Food Supply Chain

When Smithfield Foods closed its Sioux Falls pork processing plant – joining other meat and…

published 18 - May - 2020
Read More
news

Remote work: 6 common misunderstandings about online security threats

VPN, cloud, and phishing misunderstandings show up in myths about security and remote work. Security…

published 13 - May - 2020
Read More
news

Information Security Forum Releases Updated Guide to Security Best Practices

The Information Security Forum (ISF) has published a major update to its Standard of Good Practice (The…

published 11 - May - 2020
Read More
news

Vishing and Cybercriminals during COVID-19

The COVID-19 pandemic has resulted in an upshot of all types of scams. In the…

published 05 - May - 2020
Read More
news

Understanding the CFO’s Cybersecurity Role in the Age of COVID-19

Senior executives understand that today’s global economy is still not adequately protected against cyberattacks, despite…

published 04 - May - 2020
Read More
news

Google, Apple tighten protections on contact tracing; Americans worry over privacy

As the likes of Google and Apple bolster privacy in the race to come up…

published 01 - May - 2020
Read More
news

The Impact of Coronavirus on the Threat Landscape

How has the coronavirus impacted the outlook on security over the next few years? The…

published 28 - April - 2020
Read More
news

Connecticut town drops drone program to combat COVID-19 spread over privacy concerns

“Like other Internet of Things (IoT) devices, drones currently have very poor security controls, making…

published 28 - April - 2020
Read More
news

Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022

Researchers outline cybersecurity threats they predict businesses will face in two years as technology evolves.…

published 23 - April - 2020
Read More
news

Risk Management, Insider Threats and Security Leaders in the Age of COVID-19

An insider threat is a security risk that originates from within an organization. According to…

published 22 - April - 2020
Read More
news

The Privacy-Security Balance in Digital Surveillance: Lessons from COVID-19

A major feature of the current COVID-19 crisis has been the sudden growth of state…

published 21 - April - 2020
Read More
news

Information Security Forum: Nine Cybersecurity Threats Organizations can Expect Through 2022

The Information Security Forum (ISF) has released Threat Horizon 2022, the latest in a series of…

published 20 - April - 2020
Read More
news

IoT security, neglected infrastructure, and a crisis of trust deemed major threats for 2022

The Information Security Forum predicts the coming threats with a very good track record so…

published 16 - April - 2020
Read More
news

When All Behavior Is Abnormal, How Do We Detect Anomalies?

Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects…

published 15 - April - 2020
Read More
news

If Remote Working is the New Norm, How Do We Do it Securely?

“My biggest concern is when remote workers enter phase three since it is unlikely that…

published 14 - April - 2020
Read More
news

FBI: COVID-19-Themed Business Email Compromise Scams Surge

"Criminals have become more sophisticated by considering the psychological aspects of an attack," says Mark…

published 08 - April - 2020
Read More
news

Nearly 10 Million People Filed for Unemployment in the US: What Does It Mean for the Cybersecurity and IT Workforce?

The number of new people claiming unemployment benefits totaled a staggering 6.648 million last week…

published 06 - April - 2020
Read More
news

Covid-19 Poll Results: One in Four Prioritize Health Over Privacy

“Ultimately we are being asked to trust our governments in their ability to handle personal…

published 01 - April - 2020
Read More
news

The Long-Term Impact of #COVID19 on the Cybersecurity Industry

“Remote working and remote business interactions will identify new opportunities, new ways of working that…

published 31 - March - 2020
Read More
news

The Short-Term Impact of #COVID19 on the Cybersecurity Industry

As we work remotely and isolate ourselves from friends and colleagues as best we can,…

published 26 - March - 2020
Read More
news

As coronavirus spreads, cybersecurity staff contend with increasing attacks, remote workers

As the COVID-19 pandemic continues to spread, cybersecurity professionals have never been busier. Despite some reports of cybercriminals…

published 24 - March - 2020
Read More
news

15 Coronavirus Online Scams to Watch Out For

“Our appetite for information is vast and cybercriminals know this so there may be attachments…

published 23 - March - 2020
Read More
news

Covid-19 Spurs Facial Recognition Tracking, Privacy Fears

The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues…

published 20 - March - 2020
Read More
news

Security Think Tank: To tackle Covid-19, be prepared, flexible and resilient

In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of…

published 18 - March - 2020
Read More
news

European Electricity Association Confirms Hackers Breached its Office Network

ENTSO-E, the European Network of Transmission System Operators, has announced that it found evidence of…

published 17 - March - 2020
Read More
news

Keys to Hiring Cybersecurity Pros When Certification Can't Help

There just aren't enough certified cybersecurity pros to go around -- and there likely never…

published 16 - March - 2020
Read More
news

Use the human-centered approach for smarter security and compliance teams

By Steve Durbin, Managing Director of the Information Security Forum. As the cyberthreat landscape becomes…

published 05 - March - 2020
Read More
news

Insider Threats: How Co-Workers Became a Bigger Security Headache

One of the biggest security threats to your team might be the person working right…

published 03 - March - 2020
Read More
news

Conquering the Cyber Security Challenges of The Cloud

By Steve Durbin, Managing Director, Information Security Forum Cloud computing has become a prevalent force, bringing…

published 26 - February - 2020
Read More
news

US Sen. Gillibrand Announces Legislation to Create a Data Protection Agency

"As pressure from regulatory compliance increases, businesses must take an increasingly integrated and well-rounded approach…

published 17 - February - 2020
Read More
news

Overcoming the Cyber Security Challenges of the Cloud

The rise in business processes supported by cloud services has been well evidenced by organizations…

published 14 - February - 2020
Read More
news

Ringing in a new National Privacy Law?

Privacy advocates have long called for a federal privacy law and it’s coming…in the meantime,…

published 05 - February - 2020
Read More
news

Security Think Tank: Bug bounties are changing the image of hackers

The traditional picture of a hacker is of a script kiddie in a hoodie hunched…

published 03 - February - 2020
Read More
news

Data Privacy Day 2020 Encourages Consumers to “Own Their Privacy”

The theme of Data Privacy Day 2020 is “Own Your Privacy.” Data Privacy Day began…

published 29 - January - 2020
Read More
news

Lawmakers Introduce Bill to Reform NSA Surveillance

"This debate has been ongoing for some time now and there is clearly a need…

published 27 - January - 2020
Read More
news

Security Think-Tank: Tackle insider threats to achieve data-centric security

The belief that effective perimeter security is the best way to protect data is a…

published 24 - January - 2020
Read More
news

World Economic Forum Global Risks Report Highlights Dangers of Digital innovation

"In a hyperconnected world, attack surfaces and interdependencies will grow astonishingly quickly," warns Steve Durbin,…

published 23 - January - 2020
Read More
news

Eurasia Risks 2020: Exacerbation of the Battle for Technological Dominance

"Technological advances are not restricted to America and China. They are a global phenomenon both…

published 22 - January - 2020
Read More
news

Five Reasons Why Supply Chain Security Must be on Your Agenda

How do you know that the critical parts inside your servers and devices are not…

published 20 - January - 2020
Read More
news

Cybersecurity 2020: Welcome to the Digital Cold War

The race to develop strategically important next-generation technology will drive an increase in nation-state-backed attacks.…

published 13 - January - 2020
Read More
news

The Top Three Global Cyber Security Threats for 2020

In the year ahead, organisations of all sizes must prepare for the unknown, so they…

published 13 - January - 2020
Read More
news

Deciphering Artificial Intelligence in the Future of Information Security

Artificial Intelligence (AI) is creating a new frontline in information security. Systems that independently learn, reason and…

published 08 - January - 2020
Read More
news

Maximise your defence with people power

Humans are often referred to as the “weakest link” in information security. However, organisations have…

published 08 - January - 2020
Read More
news

Cybersecurity New Year’s Resolutions from the Information Security Forum

It’s that time of year again. Time for every one of us to reminisce on…

published 06 - January - 2020
Read More
news

New ISF Paper Attempts to Demystify AI in Information Security

In a paper released today, the Information Security Forum is urging organizations to capitalize on the opportunities…

published 11 - October - 2019
Read More