You are viewing 19 of 25 results
news

Hack on Japanese Port Shows How Compromised Operational Technology Can Have a Widespread Impact

Paul Holland shares his thoughts on protecting and securing the integrity and confidentiality of information within OT environments.

published 17 - July - 2023
Read More
news

COSMICENERGY: A new threat to OT

Paul Holland provides insight into a possible new threat to operational technology environments, specifically those in the energy sector.

published 02 - June - 2023
Read More
news

Top Risks and Best Practices for Securely Offboarding Employees

Outgoing employees pose significant security risks to organizations. Here are some of the major issues…

published 26 - April - 2023
Read More
news

Invest in Developing a Human-Centred Security Program

Steve Durbin explores steps to developing a human-centred security program that engages your workforce to better protect your organisation.

published 24 - April - 2023
Read More
news

Security and the Business: It's good to talk

Paul Watts explores the shifting nature of business, the role of the security leader, and the impact of not aligning to each other’s goals.

published 09 - March - 2023
Read More
news

Measuring Cyber Security: The what, why and how

Steve Durbin explores the ways security teams can best measure, analyse and report cyber security threats and performance

published 16 - February - 2023
Read More
news

Navigating the Politics of Measuring Security

Richard Absalom explores the soft skills needed to navigate boardroom politics, ensuring measurements support decisions and drive action.

published 15 - February - 2023
Read More
news

Four Cyber Risk Trends to Watch in 2023 and How Businesses Can Mitigate Them

With cyber security becoming riskier, costlier and more complicated, Steve Durbin explores four key challenges to look out for in 2023.

published 11 - January - 2023
Read More
news

Five Top Qualities You Need to Become a Next-Gen CISO

Steve offers actionable guidelines to building and maintaining the skills and relationships that can take security leaders to the next level.

published 19 - December - 2022
Read More
news

How Cyber Threat Intelligence Provides Security and Value to Business

Steve Durbin offers his thoughts on how enterprises can make the most out of threat intelligence for smarter security.

published 23 - November - 2022
Read More
news

Best Practices to Help Strengthen Your Company's Security Culture

Human behaviour is one of the biggest challenges faced by security practitioners, leaders and cyber risk managers today.

published 13 - October - 2022
Read More
news

Solve ICS Security Issues with ICS and IT Team Convergence

Threat actors are predicted to weaponise industrial control systems in order to harm or kill humans by 2025 - how should you prepare?

published 29 - September - 2022
Read More
news

The Threat of Deepfakes and Their Security Implications

Steve Durbin discusses the cyber best practices and security controls you should be implementing now to mitigate the threat of deepfakes.

published 07 - September - 2022
Read More
news

Securing Industrial Control Systems: The What, Why and How

Steve Durbin featured in Forbes to shed light on the best practices you should consider to better protect ICS environments.

published 30 - August - 2022
Read More
news

Organisations Cannot Prosper Without Trust: Five ways to boost trust with cyber security

Steve Durbin offers advice on how you can prevent the dilution of enterprise value and trust in the eyes of your stakeholders.

published 04 - August - 2022
Read More
news

Security Think Tank:
Balanced approach can detangle supply chain complexity

Francesca Williamson shares insight on how you can detangle the complexities of the supply chain and create better security practices.

published 08 - July - 2022
Read More
news

Six Steps to Validate Cyber Incident Response Plans in Times of Conflict

Steve Durbin features in the World Economic Forum, offering considerations to consider when evaluating cyber incident response capabilities.

published 28 - June - 2022
Read More
news

Three Unintended Consequences of Well-Intentioned Cyber Regulations

Steve explains how you can prepare against unintended consequences of cyber regulations, no matter how well-intentioned they might be.

published 10 - June - 2022
Read More
news

What's Zero Trust, and What's Driving Its Adoption?

Steve Durbin deconstructs Zero Trust; explaining how it works, what the common misconceptions are, and what to consider before implementation.

published 08 - June - 2022
Read More
news

7 Steps to Combat Cybersecurity Threats in Times of Instability

Steve Durbin outlines steps organisations and security teams can use to understand and prepare for potential threats in times of instability.

published 18 - May - 2022
Read More
news

How Cybersecurity Leaders Can Add Value to M&A Deals

Steve Durbin offers advice on the M&A process: how you can mitigate risk and highlight to leadership the value of information security.

published 10 - May - 2022
Read More
news

World's Largest Cybersecurity Benchmarking Study Finds that Top Executives Believe their Organizations are Not Prepared for New Era of Risk

ThoughtLab's press release for their study, providing evidence-based insights into the most effective cybersecurity practices and investments.

published 10 - May - 2022
Read More
news

Five Proactive Steps CISOs Can Take During Times of Instability

Steve Durbin outlines how CISOs can shift from being reactive to proactive, improving the overall resilience of their organisation.

published 22 - April - 2022
Read More
news

The Importance of Effective Cyber Risk Management

Dan Norman looks at what needs to be considered when evaluating the risks involved in an organisation’s security strategy.

published 07 - April - 2022
Read More
news

Security Think Tank: Good training is all about context

Emma Bickerstaffe explores what makes a good security training programme and questions buyers should ask when procuring training as a service.

published 04 - March - 2022
Read More
news

Positively Influencing Security Behaviour

Daniel Norman, ISF Senior Solutions Analyst, takes a closer look at 'Human-Centred Security' and how to achieve it.

published 23 - February - 2022
Read More
news

Confronting Pervasive Cyber Threats for 2022 and Beyond

Discussing key pervasive cyber threats for 2022, Steve Durbin's recent Forbes article presents a strong foundation for security teams.

published 24 - January - 2022
Read More
news

10 Cognitive Biases that can Derail Cybersecurity Programs

Read Steve Durbin's latest article highlighting the impact of the unconscious mind upon cybersecurity vulnerabilities.

published 17 - January - 2022
Read More
news

Security Think Tank: Reframing CISO-boardroom relations

Read Emma Bickerstaffe's latest article for Computer Weekly as she offers CISO's food-for-thought following the pandemic.

published 20 - December - 2021
Read More
news

Zero Trust: Five Misconceptions Every Business Should Avoid

Cybercrime is a major threat to every industry and organization in the world. No wonder global entities are desperately seeking a silver bullet that can somehow neutralize cybersecurity threats.

published 06 - December - 2021
Read More
news

Why Does Ransomware Still Work?

Paul Watts, distinguished analyst, contributes to how ransomware has managed to retain its high profile in cybercrime for Computer Weekly.

published 30 - November - 2021
Read More
news

Zero Trust: An Answer to the Ransomware Menace?

By Steve Durbin, Chief Executive of the ISF. Zero trust isn't a silver bullet, but…

published 22 - November - 2021
Read More
news

An Effective Supply Chain Starts With Security

For more advanced, sophisticated supply chains, it’s about continually going back over it to increase…

published 06 - September - 2021
Read More
news

What are the risks associated with personal, unsanctioned apps on corporate devices and why?

From a security perspective, what are the personal apps/app types that you think CISOs should…

published 24 - August - 2021
Read More
news

Adapting InfoSec for Container Security

Containerization has effectively become the new normal for expediting app delivery and improvements; security concerns…

published 27 - July - 2021
Read More
news

A return to the office is not a return to normal

Perhaps the biggest change that CISOs need to accept is that hybrid working is how…

published 20 - July - 2021
Read More
news

Top 5 cybersecurity challenges in the hybrid office

The pandemic has caused a tectonic shift in how we live and work. Many companies…

published 18 - June - 2021
Read More
news

How Cyber Security Criminals Exploit the 'Accidental Insider'

In the first of his regular new information security columns for Security Middle East, Daniel…

published 14 - April - 2021
Read More
news

The new reality of a world online

Interview with Steve Durbin, Chief Executive of the ISF and The European  The combination of…

published 06 - April - 2021
Read More
news

How To Develop A Human-Centered Security Program

While many organizations have a security awareness training program in place, few trigger real behavior change or...

published 25 - March - 2021
Read More
news

Technology Is Just A Tool: Why People Are The Heart Of Everything We Do In Business

The idea that technology can solve all our problems is seductive. It seems like every product vendor claims to...

published 01 - March - 2021
Read More
news

Eight Cyber Challenges In An Uncertain World

With the pandemic precipitating a health crisis that continues to threaten the global economy and the real possibility of a...

published 10 - February - 2021
Read More
news

Six Ways A Good Leader Can Become A Great Leader

Many people can become good leaders. After all, you can learn how to communicate and how to be a better listener; you can...

published 09 - February - 2021
Read More
news

Cybercrime to Scale New Heights in 2021: What Can You do About it?

By Steve Durbin, Chief Executive of the ISF With the pandemic precipitating a rapid acceleration…

published 08 - February - 2021
Read More
news

Five Threat Vectors Destined To Make Waves In 2021

By Steve Durbin, CEO of the Information Security Forum, and Forbes Business Council Member Building…

published 20 - January - 2021
Read More
news

New Year’s Resolutions for the Board in 2021

By Steve Durbin, CEO of the ISF Maturing your organization’s ability to detect intrusions quickly…

published 13 - January - 2021
Read More
news

Cybersecurity Must Be the Top Priority for the Board in 2021

By Steve Durbin, CEO of the ISF Leading the enterprise to a position of readiness,…

published 07 - January - 2021
Read More
news

10 Benefits of Running Cybersecurity Exercises

By Steve Durbin, Managing Director of the ISF. There may be no better way to…

published 06 - January - 2021
Read More
news

2020 Work-for-Home Shift: What We Learned

One area that organizations need to deal with is the rise of the insider threat,…

published 05 - January - 2021
Read More
news

Cybersecurity in 2021: 5 Trends Security Pros Need to Know

The insider threat is one of the greatest drivers of security risks that organizations face…

published 21 - December - 2020
Read More
news

ISF Proposal for “Human-Centered Security” Focuses Security Awareness on People’s Interactions With Technology

How can security keep pace with a cyber threat landscape that rapidly becomes more sophisticated…

published 18 - December - 2020
Read More
news

Top Global Security Threats Organizations Will Face in 2021

Attackers will continue to be presented with the tools and opportunities to target and exploit…

published 17 - December - 2020
Read More
news

Eight Steps To Building A Human-Centered Security Culture

By Steve Durbin, Managing Director, Information Security Forum, and Forbes Business Council Member Ransomware, phishing,…

published 15 - December - 2020
Read More
news

New Information Security Forum Research Explores Human-Centered Security

Technology and processes should complement behavior, not add friction and impede productivity... Steve Durbin, Managing…

published 07 - December - 2020
Read More
news

Changing Employee Security Behavior Takes More Than Simple Awareness

A human-centered security program helps organizations to understand their people and carefully craft initiatives that…

published 03 - December - 2020
Read More
news

Why Security Awareness Training Should Be Backed by Security by Design

As a starting point, an individual will always choose to be productive in their current…

published 02 - December - 2020
Read More
news

Information Security Forum Research Dives Into the Need for Human-Centered Security

A typical strategy should aim to reduce the number of security incidents and improve the…

published 01 - December - 2020
Read More
news

Human-Centred Approach is Key to Better Security

Errors and acts of negligence can cause significant financial and reputational damage to an organization,…

published 27 - November - 2020
Read More
news

Organizations Should Use Psychology to Promote Secure Behavior Among Staff

Errors and acts of negligence can cause significant financial and reputational damage to an organization...…

published 27 - November - 2020
Read More
news

Cybersecurity Workforce Study Needs to be Taken with a Pinch of Salt

Apprenticeships, on the job learning, backed up with support training packages are the way to…

published 25 - November - 2020
Read More
news

Skills Shortage Rains on Cloud Advances

Cross training within an organization is a good method of closing the skills gap by…

published 16 - November - 2020
Read More
news

What Skills Will Cybersecurity Leaders Want in 2021?

All infosec teams have been under huge pressure lately and good CISOs acknowledge that and…

published 10 - November - 2020
Read More
news

Six core characteristics that next-generation CISO’s exhibit

Being a next-generation CISO is an extremely rewarding position that allows an individual to become…

published 16 - October - 2020
Read More
news

Insider vs. Outsider Data Security Threats: What’s the Greater Risk?

As data breaches increase, many will be the result of Insider threats. In fact, the…

published 06 - October - 2020
Read More
news

Georgia Election Data Hit in Ransomware Attack

Typically, the success of ransomware is reliant on whether or not the target organization has…

published 03 - October - 2020
Read More
news

What does it take to be a next generation CISO?

Becoming a next-generation CISO requires an individual to embrace and master new skills and disciplines,…

published 30 - September - 2020
Read More
news

Cybersecurity Skills Gap Worsens, Fueled by Lack of Career Development

“Increasingly, lockdown has driven us all online and the training industry has been somewhat slow…

published 17 - August - 2020
Read More
news

Remote work: 6 common misunderstandings about online security threats

VPN, cloud, and phishing misunderstandings show up in myths about security and remote work. Security…

published 13 - May - 2020
Read More
news

The Impact of Coronavirus on the Threat Landscape

How has the coronavirus impacted the outlook on security over the next few years? The…

published 28 - April - 2020
Read More
news

Risk Management, Insider Threats and Security Leaders in the Age of COVID-19

An insider threat is a security risk that originates from within an organization. According to…

published 22 - April - 2020
Read More
news

When All Behavior Is Abnormal, How Do We Detect Anomalies?

Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects…

published 15 - April - 2020
Read More
news

If Remote Working is the New Norm, How Do We Do it Securely?

“My biggest concern is when remote workers enter phase three since it is unlikely that…

published 14 - April - 2020
Read More
news

FBI: COVID-19-Themed Business Email Compromise Scams Surge

"Criminals have become more sophisticated by considering the psychological aspects of an attack," says Mark…

published 08 - April - 2020
Read More
news

Nearly 10 Million People Filed for Unemployment in the US: What Does It Mean for the Cybersecurity and IT Workforce?

The number of new people claiming unemployment benefits totaled a staggering 6.648 million last week…

published 06 - April - 2020
Read More
news

The Long-Term Impact of #COVID19 on the Cybersecurity Industry

“Remote working and remote business interactions will identify new opportunities, new ways of working that…

published 31 - March - 2020
Read More
news

The Short-Term Impact of #COVID19 on the Cybersecurity Industry

As we work remotely and isolate ourselves from friends and colleagues as best we can,…

published 26 - March - 2020
Read More
news

Keys to Hiring Cybersecurity Pros When Certification Can't Help

There just aren't enough certified cybersecurity pros to go around -- and there likely never…

published 16 - March - 2020
Read More
news

Use the human-centered approach for smarter security and compliance teams

By Steve Durbin, Managing Director of the Information Security Forum. As the cyberthreat landscape becomes…

published 05 - March - 2020
Read More
news

Insider Threats: How Co-Workers Became a Bigger Security Headache

One of the biggest security threats to your team might be the person working right…

published 03 - March - 2020
Read More
news

Security Think-Tank: Tackle insider threats to achieve data-centric security

The belief that effective perimeter security is the best way to protect data is a…

published 24 - January - 2020
Read More
news

Maximise your defence with people power

Humans are often referred to as the “weakest link” in information security. However, organisations have…

published 08 - January - 2020
Read More