Latest episodes
-
Insights Interview: Haider Pasha, Palo Alto Networks
March 5, 2026 Comments Off on Insights Interview: Haider Pasha, Palo Alto NetworksThe last few years has brought geopolitics to the fore for cybersecurity, especially in Europe. But the return of war to the continent is just one factor changing CISOs’ views of risk. Europe faces its [...] -
Threat intelligence: know your enemy
February 19, 2026 Comments Off on Threat intelligence: know your enemySecurity teams today have access to multiple sources of information on threats and threat actors. These come from industry, from law enforcement, and even their own networks and SOCs. The volume of information can sometimes [...] -
Sovereignty, resilience and data: Keepit CISO Kim Larsen
February 5, 2026 Comments Off on Sovereignty, resilience and data: Keepit CISO Kim LarsenDigital sovereignty is now at, or near the top, of CIOs’ agendas. And cyber resilience is a key goal for the CISO. But can resilience and sovereignty work together? Are they opposed, or are they [...] -
Politics, geography, and AI: cyber threats in 2026 and beyond
January 8, 2026 Comments Off on Politics, geography, and AI: cyber threats in 2026 and beyondOrange Cyberdefense’s annual Security Navigator report is now well-established as a barometer of the cyber threat landscape. The report puts a special emphasis on cyber extortion and cyber crime. But it also stands out for [...] -
Resilience in cyber: an agony aunt’s view
December 18, 2025 Comments Off on Resilience in cyber: an agony aunt’s viewTo build a resilient organisation, you need resilient people. Cybersecurity sometimes puts its people under a great deal of pressure. The constant demand to stay ahead of adversaries takes its toll. And it can be [...] -
Calm under fire: the importance of cyber resilience
November 27, 2025 Comments Off on Calm under fire: the importance of cyber resilienceThere is no let up in cyber attacks and cybersecurity incidents. This year has seen a series of high profile, and damaging attacks. But, as businesses and organisations look to be facing ever greater threats, [...] -
Bug bounties: risks and rewards
October 16, 2025 Comments Off on Bug bounties: risks and rewardsBug bounties are big business. The most accomplished hackers can now make a good living hunting down and disclosing security flaws. Some of the largest programmes now offer bounties of $1m or more. A growing [...] -
DDoS, geopolitics and AI
October 2, 2025 Comments Off on DDoS, geopolitics and AIDistributed denial of service attacks, or DDoS, remain a serious source of disruption across the internet. DDoS attacks continue to grow in their frequency and volume. Researchers at NETSCOUT recorded over 8m DDoS attacks in [...] -
Cyber skills: a crisis of our own making?
September 18, 2025 Comments Off on Cyber skills: a crisis of our own making?Is cybersecurity’s skills crisis one of its own making? There are between three and four million vacancies for cybersecurity professionals worldwide, depending on the research you read. Over the years, there has been plenty of [...] -
Defending education: countering the cyber threat
September 5, 2025 Comments Off on Defending education: countering the cyber threatEducation is an attractive target for malicious actors in cyberspace. Hackers attack schools, colleges and universities for the information they hold. That includes personal, academic and research data. And they are also vulnerable to extortion [...] -
Vulnerabilities, CVEs and the attack surface
August 21, 2025 Comments Off on Vulnerabilities, CVEs and the attack surfaceThe way we measure security threats is changing. As security has become a board-level priority, cybersecurity teams need to think in terms of risk. But where does that leave vulnerability scores? Are venerable systems such [...] -
Human risk factors: cybersecurity’s hidden weak spot
August 7, 2025 Comments Off on Human risk factors: cybersecurity’s hidden weak spotOne of the biggest, if not the biggest, risks in cybersecurity is human behaviour. More than three quarters of security breaches result from human action or errors. But the cybersecurity industry focuses more on technical [...] -
AI, Testing and Red Teaming, with Peter Garraghan
July 24, 2025 Comments Off on AI, Testing and Red Teaming, with Peter GarraghanAI clearly offers benefits. But when it comes to security, it also brings its own risks. Artificial intelligence is often described as a “black box”. We can see what we put in, and what comes [...] -
Non-human identities: the rise of the machines
July 3, 2025 Comments Off on Non-human identities: the rise of the machinesThe vast majority of internet users are no longer humans. The stark reality is that most online traffic is now between machines, or software. Non-human identities, or machine identities, now outnumber human actors on the [...]