Discover how OSINT awareness can mitigate social engineering attacks in Steve Durbin's latest SC Media feature.
Explore with Steve Durbin the top cybersecurity concerns for boardrooms, from data breaches to AI-powered threats.
Steve Durbin, ISF CEO, shares five key elements required to design cyber simulation exercises aimed at enhancing cyber resilience.
ISF CEO STEVE Durbin featured in Helpnet Security to share his insights on how to design and develop an effective cyber simluation exercise.
With cyber security becoming riskier, costlier and more complicated, Steve Durbin explores four key challenges to look out for in 2023.
Paul Watts details what you should be focussing on when thinking about business resiliency in the context of ransomware.
Paul Watts questions whether cyber insurance is a must-have item, an expensive luxury, or the emperor’s new clothes.
Steve explains the five steps organisations can take to help mitigate potential threats against the supply chain and be better armed.
Steve explains how you can prepare against unintended consequences of cyber regulations, no matter how well-intentioned they might be.
Steve Durbin outlines steps organisations and security teams can use to understand and prepare for potential threats in times of instability.
Steve Durbin expands upon the risks, not only to individuals and businesses, but also to nations as 5G technologies transform communications.
Read Steve Durbin's latest article addressing the most common ransomware attack techniques whilst offering guidance on their prevention.
Paul Watts features in this Computer Weekly article aimed at helping security professionals lead with knowledge, rather than react with fear.
Paul Watts, distinguished analyst, contributes to how ransomware has managed to retain its high profile in cybercrime for Computer Weekly.
By Steve Durbin, Chief Executive of the ISF. Zero trust isn't a silver bullet, but…
Here are five questions to help determine if your company needs cyber coverage. The cyber…
To pay or not to pay? Notwithstanding the ethical and emerging federal legal liability issues…
Zero trust is a strategy organisations will need to look at implementing in the same…
Dan Norman, senior solutions analyst at the Information Security Forum, guides us through the key…
The speed of the outage and the protracted nature of the recovery bears all of…
The number of devices and associated challenges are far too many. IIoT devices possess limited…
As the UK chases a Brexit dividend to open up non-EU markets to UK businesses…
Until now, there were limitations on some of the heavier network related devices like virtual…
there is a misbelief that ships are not vulnerable to cyber incidents, leading to an…
...the sheer volume and velocity of 5G networks, combined with the complex infrastructure and heavy…
Ransomware will proliferate over the coming years, with attackers locking individuals into, or out of,…
Organisations often have the best of intentions when creating some of these types of software,…
Perhaps the biggest change that CISOs need to accept is that hybrid working is how…
Develop a holistic backup strategy that covers all systems and core infrastructure services. Steve Durbin,…
The pandemic has caused a tectonic shift in how we live and work. Many companies…
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses…
Satellites support so much of our business infrastructure, but being in space doesn't make them…
Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the…
In the first of his regular new information security columns for Security Middle East, Daniel…
The first nation state to develop technologies such as AI, 5G, robotics and quantum computing…
By Steve Durbin, Chief Executive of the ISF With the pandemic precipitating a rapid acceleration…
By Steve Durbin, CEO of the Information Security Forum, and Forbes Business Council Member Building…
The success of ransomware is reliant on whether or not the target organization has patched…
Payment of a ransom is also a contentious discussion – in many cases the ransom…
I, for one, am wary if a website asks me, unprompted, to download anything. It…
Also, beware of email “offers” from companies you don’t recognize and even those that you…
Organizations should have an incident response or crisis management plan for ransomware events, knowing who…
Privacy should also be a high priority for anyone handling sensitive information, considering the shift…
Basic cyber hygiene standards need to be met, covering patching and updates, network segmentation, network…
The healthcare services have an outdated approach to security awareness, education, and training... Daniel Norman,…
Anyone with access to the Dark Web can buy readily available ransomware kits for less than $100.…
The attacking state will build user profiles, understand patterns of behavior and then they will…
Attackers will once again turn their attention to disrupting the health service by targeting poorly…
By Steve Durbin, Managing Director of the Information Security Forum, and Forbes Business Council Member…
Typically, the success of ransomware is reliant on whether or not the target organization has…
By Steve Durbin, Managing Director, ISF Current attacks will continue to be refined, and what…
The Information Security Forum (ISF) has published a major update to its Standard of Good Practice (The…
The COVID-19 pandemic has resulted in an upshot of all types of scams. In the…
Senior executives understand that today’s global economy is still not adequately protected against cyberattacks, despite…
“My biggest concern is when remote workers enter phase three since it is unlikely that…
"Criminals have become more sophisticated by considering the psychological aspects of an attack," says Mark…
As the COVID-19 pandemic continues to spread, cybersecurity professionals have never been busier. Despite some reports of cybercriminals…
“Our appetite for information is vast and cybercriminals know this so there may be attachments…
ENTSO-E, the European Network of Transmission System Operators, has announced that it found evidence of…
The traditional picture of a hacker is of a script kiddie in a hoodie hunched…
How do you know that the critical parts inside your servers and devices are not…