
Latest episodes
-
The greatest threat to cybersecurity might not be nation state actors, organised crime, or protest groups. Instead, it could be the next generation of computer technology. Quantum computing promises to be so powerful that it [...]
-
The EU’s upcoming Cyber Resilience Act has big ambitions, with the goal to improve security for anything with “digital elements”. The Act will apply to hardware and software. The idea is to make it easier [...]
-
Globally, there are more than 3.5 million unfilled jobs in cybersecurity. And the situation is becoming worse, not better. One reason is a growth in cyber threats. Certainly, there are few signs of attacks dropping [...]
-
Most of us now accept that cyber attacks are inevitable. CISOs, certainly, expect there to be attacks, and breaches. None the less, organisations are not doing enough to ensure that they can withstand cyber attacks. [...]
-
Healthcare is coming under an increasing volume of cyber attacks, especially since the pandemic. And attacks are spreading to smaller healthcare outfits, such as ambulance services, suppliers to the healthcare system, and the pharmaceutical industry. [...]
-
The last few years have seen growing concerns about cyber war, driven by events in Ukraine, the Middle East and other conflict zones, and a rise incidents linked back to nation state actors. But a [...]
-
According to analysts, more than half of key IT spending is now in the cloud. There is no doubt that it is now a mainstream technology; gone are the days when cloud was just for [...]
-
How do we operate in a world where there is no such thing as absolute truth? And where whether a statement, event or even someone’s identity is a likelihood, probability, or a percentage score? That [...]
-
When John Stenton started as head of IT at housing provider Thrive Homes, he admits its technology was a “bit of a mess”. There was a lot to do, both to review security and to [...]
-
There’s an increasing focus on resilience in cyber. No defence is impenetrable, so organisations are looking not just at how they detect and prevent attacks, but how they maintain operations and recover. But a key, [...]