You are viewing 19 of 25 results
Array
research

Threat Horizon 2024: The disintegration of trust

Should organisations attempt to rebuild trust, or accept that it has disintegrated and adapt accordingly?

Read more
Array
research

Cybersecurity Solutions for a Riskier World

A ThoughtLab study providing evidence-based insights into the most effective cybersecurity practices and investments.

Read more
Array
research

Information Security in Mergers and Acquisitions

This excerpt from the full ISF briefing paper introduces a typical four-step process and helps promote the value of security in M&A activity.

Read more
Array
research

Managing Cyber Threats During Periods of Instability

Seven Proactive Steps Towards Stabilisation

Read more
Array
research

Threat Horizon 2022: Digital and physical worlds collide

By 2022, organisations will be plunged into crisis as ruthless attackers exploit technologies and take advantage of an unprepared workforce. At the same time, natural forces will ravage infrastructure.

Read more
Array
research

Demystifying Zero Trust

Zero trust continues to cause confusion across industries. Many vendors sell it as an off-the-shelf solution, but in reality, its successful implementation requires organisations to embark on a larger change programme.

Read more
Array
research

Understanding the ransomware menace

No sector is immune. Ransomware attacks hit police forces, healthcare providers, educational establishments, the oil…

Download Now
Array
research

Securing Containers: Keeping pace with change

Organisational use of Containers has been increasing rapidly, rising from 23% to 92% in a 4-year period.

Read more
Array
research

Security Architecture: Navigating complexity

Budgetary investments in information security are under renewed scrutiny as organisations struggle to justify even the smallest spend.

Read more
Array
research

Becoming a next-generation CISO

As organisations undergo digital transformation to make themselves more responsive, CISOs are coming under pressure to help these far-reaching changes succeed.

Read more
Array
research

Securing the IoT: Taming the Connected World

The Internet of Things (IoT) has exploded into the connected world and promises much: from…

Read more
Array
research

Using Cloud Services Securely: Harnessing Core Controls

Cloud computing has evolved at an incredible speed and, in many organisations, has become entwined with the complex technological landscape that supports critical daily operations.

Read more
Array
research

Demystifying Artificial Intelligence in Information Security

Whilst AI poses new information risks, it can also be used for good and should become a key part of every organisation’s defensive arsenal.

Read more
Array
research

Securing Mobile Apps: Embracing mobile, balancing control

The availability of mobile apps and mobile devices presents organisation with a conundrum. On the…

Read more
Array
research

Industrial Control Systems: Securing the systems that control physical environments

With so many global organisations heavily reliant on Industrial Control Systems (ICS) to support business operations, senior business managers and boards are now encountering growing pressure to improve and maintain the security of their organisations ICS Environments.

Read more
Array
research

Delivering an Effective Cyber Security Exercise

Performing cyber security exercises can help organisations improve their ability to detect, investigate and respond to cyber attacks in a timely and effective manner.

Read more
Array
research

Building A Successful SOC: Detect Earlier, Respond Faster

Building a successful Security Operations Centre (SOC) can greatly enhance the ability to detect and disrupt cyber attacks, protecting the business from harm.

Read more
Array
research

Blockchain and Security: Safety in Numbers

Understanding the potential security risks related to blockchain and how they can be addressed, is vital for any organisation planning to use it as the basis for developing applications.

Read more
Array
research

Building Tomorrow’s Security Workforce

Business and security leaders today must actively work to build and sustain a robust security workforce, as shortfalls in skills and capability to manage risk can manifest as major security incidents that damage organisational performance, reputation and image.

Read more
Array
research

Data Privacy in the Cloud: Enabling business agility by managing risk

With cloud-based systems come inherent challenges. These are further complicated as data subject to privacy regulation inevitably moves into the cloud.

Read more