Latest episodes
-
The global cybersecurity industry is growing rapidly. But it is also fragmented. This is especially the case in Europe, which has more smaller cybersecurity firms. Even so, the market is worth some $50bn and is [...]
-
As many as 90 per cent of security breaches involve human error or social engineering. So how do we reduce the risks from human behaviour? In this, the second of our short series exploring the [...]
-
In just a few short years, artificial intelligence has moved from an academic computer science discipline to the most talked about topic in technology. And, though some aspects of AI are surely overhyped – AI [...]
-
Advanced economies now rely heavily on their IT infrastructure, as recent events have shown only too clearly. We are probably fortunate that the incident that grounded flights and stopped card payments around the world was [...]
-
Everyone in cybersecurity knows ransomware is a problem. What’s less clear, is how we can defend against it. Despite the coverage ransomware generates, it’s hard to put an exact figure on ransomware attacks. All the [...]
-
Constant change and the need to adapt is always a feature of cybersecurity. It is certainly a feature of the day to day role of the CISO. And that’s why our guest this week lists [...]
-
Should cybersecurity leaders look beyond their own organisations, to fill the skills gap? Cybersecurity’s skills shortage is a persistent problem, despite the best efforts of recruiters, governments, the education sector and professional bodies. Worldwide, there [...]
-
A growing number of organisations are appointing chief business security officers. But what do they do, and why are they needed? With businesses facing a greater range of threats — both physical and virtual — [...]
-
Ransomware now accounts for as much as 90% of cyber attacks. And over the last 10 years, ransomware has grown steadily in volume, but also as a threat. Ransomware is not just about encrypting data; [...]
-
The cloud is now a secure way to secure data and run applications. Or it should be. Cloud service providers, especially the “hyperscalers”, now have robust security in place. And their security measures are typically [...]
-
Passwords have been around for millennia. But are they still fit for purpose? If not, what should replace them? Passwords were once simply a way to prove identity: something you know, to prove who you [...]
-
Critical national infrastructure is constantly under attack, from an ever greater range of threat actors. Not all the attacks are reported, of course, and governments and businesses go to great lengths to protect their systems, [...]