You are viewing 19 of 25 results
news

Six Steps to Validate Cyber Incident Response Plans in Times of Conflict

Steve Durbin features in the World Economic Forum, offering considerations to consider when evaluating cyber incident response capabilities.

published 28 - June - 2022
Read More
news

Five Ways to Secure the Supply Chain in Times of Conflict

Steve explains the five steps organisations can take to help mitigate potential threats against the supply chain and be better armed.

published 15 - June - 2022
Read More
news

Three Unintended Consequences of Well-Intentioned Cyber Regulations

Steve explains how you can prepare against unintended consequences of cyber regulations, no matter how well-intentioned they might be.

published 10 - June - 2022
Read More
news

7 Steps to Combat Cybersecurity Threats in Times of Instability

Steve Durbin outlines steps organisations and security teams can use to understand and prepare for potential threats in times of instability.

published 18 - May - 2022
Read More
news

How Cybersecurity Leaders Can Add Value to M&A Deals

Steve Durbin offers advice on the M&A process: how you can mitigate risk and highlight to leadership the value of information security.

published 10 - May - 2022
Read More
news

World's Largest Cybersecurity Benchmarking Study Finds that Top Executives Believe their Organizations are Not Prepared for New Era of Risk

ThoughtLab's press release for their study, providing evidence-based insights into the most effective cybersecurity practices and investments.

published 10 - May - 2022
Read More
news

Cyber Risks for the Emerging 5G Era

Steve Durbin expands upon the risks, not only to individuals and businesses, but also to nations as 5G technologies transform communications.

published 29 - April - 2022
Read More
news

Five Proactive Steps CISOs Can Take During Times of Instability

Steve Durbin outlines how CISOs can shift from being reactive to proactive, improving the overall resilience of their organisation.

published 22 - April - 2022
Read More
news

5 Levers Lawmakers Can Use to Tackle Cybercrime

Steve Durbin breaks down each element of the cybersecurity framework presented in the recently released report led by the ISF with CC-Driver.

published 11 - April - 2022
Read More
news

The Importance of Effective Cyber Risk Management

Dan Norman looks at what needs to be considered when evaluating the risks involved in an organisation’s security strategy.

published 07 - April - 2022
Read More
news

Four Major Cyber Risks in an Era of Tech Dominance

Read as Steve explores the technological risks that may lead to crises in the next decade in his latest article for Forbes.

published 16 - March - 2022
Read More
news

Positively Influencing Security Behaviour

Daniel Norman, ISF Senior Solutions Analyst, takes a closer look at 'Human-Centred Security' and how to achieve it.

published 23 - February - 2022
Read More
news

Confronting Pervasive Cyber Threats for 2022 and Beyond

Discussing key pervasive cyber threats for 2022, Steve Durbin's recent Forbes article presents a strong foundation for security teams.

published 24 - January - 2022
Read More
news

The 6 Best Practices to Prevent Ransomware Infection

Read Steve Durbin's latest article addressing the most common ransomware attack techniques whilst offering guidance on their prevention.

published 21 - January - 2022
Read More
news

10 Cognitive Biases that can Derail Cybersecurity Programs

Read Steve Durbin's latest article highlighting the impact of the unconscious mind upon cybersecurity vulnerabilities.

published 17 - January - 2022
Read More
news

"log4j 2" - a perfect way to ruin a security professional's weekend

By now Members will be very familiar with the concern around the 'log4j 2' remote code execution vulnerability; Apache's java-based logger library also known as 'Log4Shell'. This vulnerability is filed as CVE-2021-44228 in the NIST National Vulnerability Database.

published 16 - December - 2021
Read More
news

Zero Trust: Five Misconceptions Every Business Should Avoid

Cybercrime is a major threat to every industry and organization in the world. No wonder global entities are desperately seeking a silver bullet that can somehow neutralize cybersecurity threats.

published 06 - December - 2021
Read More
news

Maritime Cyber Security: A Global Challenge Tackled through Distinct Regional Approaches

Maritime cyber security is an emerging issue that requires immediate attention, according to the International Maritime Organization (IMO). Feedback received from global shipping professionals indicate that a common threat to the industry, such as cyber security, is dealt with differently among industry practitioners around the globe.

published 30 - November - 2021
Read More
news

Zero Trust: An Answer to the Ransomware Menace?

By Steve Durbin, Chief Executive of the ISF. Zero trust isn't a silver bullet, but…

published 22 - November - 2021
Read More
news

Federal Cybersecurity Directive Spotlights Aging Computer Systems

Chronis Kapalidis, Principal at the ISF featured in WSJ. Many of the cybersecurity gaps outlined…

published 09 - November - 2021
Read More
news

Is cyber insurance a worthwhile investment?

Here are five questions to help determine if your company needs cyber coverage. The cyber…

published 02 - November - 2021
Read More
news

Embracing vulnerability management for the greater good

It is important to recognise that although setting out a policy and process for RD…

published 04 - October - 2021
Read More
news

The next wave of cyberattacks will have 5G to thank

Given the high stakes, security should be at the forefront of 5G rollout plans At…

published 04 - October - 2021
Read More
news

How criminals use artificial intelligence to fuel cyber-attacks

AI systems and can be entrenched by programmers or specific data sets. Unfortunately, if this…

published 01 - September - 2021
Read More
news

What are the risks associated with personal, unsanctioned apps on corporate devices and why?

From a security perspective, what are the personal apps/app types that you think CISOs should…

published 24 - August - 2021
Read More
news

Commercial Shipping Is the Next Cybersecurity Challenge

there is a misbelief that ships are not vulnerable to cyber incidents, leading to an…

published 17 - August - 2021
Read More
Array
news

Are 5G Networks Setting The Stage For A New Wave Of Cyberattacks?

...the sheer volume and velocity of 5G networks, combined with the complex infrastructure and heavy…

published 11 - August - 2021
Read More
news

The transport threat

Ransomware will proliferate over the coming years, with attackers locking individuals into, or out of,…

published 29 - July - 2021
Read More
news

A return to the office is not a return to normal

Perhaps the biggest change that CISOs need to accept is that hybrid working is how…

published 20 - July - 2021
Read More
news

The Trouble With Automated Cybersecurity Defenses

Speed and accuracy in identifying and responding to threats are the alluring promises of automated…

published 13 - July - 2021
Read More
news

Questions To Ask To Help You Prepare For A Cyberattack

Develop a holistic backup strategy that covers all systems and core infrastructure services. Steve Durbin,…

published 23 - June - 2021
Read More
news

Top 5 cybersecurity challenges in the hybrid office

The pandemic has caused a tectonic shift in how we live and work. Many companies…

published 18 - June - 2021
Read More
news

Time to accept printers will leak data

Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses…

published 14 - June - 2021
Read More
news

Ransomware Is Everywhere — Here’s What You Need To Consider

Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the…

published 01 - June - 2021
Read More
news

What the FLoC? Everything you need to know about Google’s new ad tech that aims to replace third-party cookies

First party cookies are really useful. For instance, they mean you don’t have to log…

published 19 - May - 2021
Read More
news

6 Tips for Managing Operational Risk in a Downturn

By Steve Durbin, Chief Executive of the ISF Coping with heightened operational risk during a…

published 16 - April - 2021
Read More
news

How Retailers Can Tackle Supply Chain Data Risk

By Steve Durbin, Chief Executive of the ISF Make security a core consideration in procurement…

published 16 - March - 2021
Read More
news

Qbot Banking Trojan Now Deploying Egregor Ransomware

Organizations should have an incident response or crisis management plan for ransomware events, knowing who…

published 26 - November - 2020
Read More
news

Why ransomware has become such a huge problem for businesses

Anyone with access to the Dark Web can buy readily available ransomware kits for less than $100.…

published 04 - November - 2020
Read More
news

Insider vs. Outsider Data Security Threats: What’s the Greater Risk?

As data breaches increase, many will be the result of Insider threats. In fact, the…

published 06 - October - 2020
Read More
news

Quantifying Cyber Risk: Why You Must & Where to Start

"The challenge for security is to be able to translate security metrics into a form…

published 22 - July - 2020
Read More
news

Remote work: 6 common misunderstandings about online security threats

VPN, cloud, and phishing misunderstandings show up in myths about security and remote work. Security…

published 13 - May - 2020
Read More
news

Information Security Forum Releases Updated Guide to Security Best Practices

The Information Security Forum (ISF) has published a major update to its Standard of Good Practice (The…

published 11 - May - 2020
Read More
news

Understanding the CFO’s Cybersecurity Role in the Age of COVID-19

Senior executives understand that today’s global economy is still not adequately protected against cyberattacks, despite…

published 04 - May - 2020
Read More
news

Risk Management, Insider Threats and Security Leaders in the Age of COVID-19

An insider threat is a security risk that originates from within an organization. According to…

published 22 - April - 2020
Read More
news

FBI: COVID-19-Themed Business Email Compromise Scams Surge

"Criminals have become more sophisticated by considering the psychological aspects of an attack," says Mark…

published 08 - April - 2020
Read More
news

The Long-Term Impact of #COVID19 on the Cybersecurity Industry

“Remote working and remote business interactions will identify new opportunities, new ways of working that…

published 31 - March - 2020
Read More
news

Security Think Tank: To tackle Covid-19, be prepared, flexible and resilient

In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of…

published 18 - March - 2020
Read More
news

European Electricity Association Confirms Hackers Breached its Office Network

ENTSO-E, the European Network of Transmission System Operators, has announced that it found evidence of…

published 17 - March - 2020
Read More
news

Insider Threats: How Co-Workers Became a Bigger Security Headache

One of the biggest security threats to your team might be the person working right…

published 03 - March - 2020
Read More
news

US Sen. Gillibrand Announces Legislation to Create a Data Protection Agency

"As pressure from regulatory compliance increases, businesses must take an increasingly integrated and well-rounded approach…

published 17 - February - 2020
Read More
news

Security Think-Tank: Tackle insider threats to achieve data-centric security

The belief that effective perimeter security is the best way to protect data is a…

published 24 - January - 2020
Read More
news

World Economic Forum Global Risks Report Highlights Dangers of Digital innovation

"In a hyperconnected world, attack surfaces and interdependencies will grow astonishingly quickly," warns Steve Durbin,…

published 23 - January - 2020
Read More
news

Maximise your defence with people power

Humans are often referred to as the “weakest link” in information security. However, organisations have…

published 08 - January - 2020
Read More