
Special Report: Red Teams
It’s no longer a question of if you will be hacked. It’s when. This makes rigorous security testing all the more important. And Red Team exercises, testing the organisation against an adversary in real time, […]
It’s no longer a question of if you will be hacked. It’s when. This makes rigorous security testing all the more important. And Red Team exercises, testing the organisation against an adversary in real time, […]
Security Insights speaks to Forrester analyst Enza Iannopollo about the analyst firm’s latest cybersecurity threat report. […]
The information security industry is struggling to overcome its skills gap. One estimate, from ISC(2), puts the number of unfilled positions at just over 3m worldwide. And the industry suffers from a lack of diversity. […]
How have businesses adapted to the pandemic, and has cybersecurity kept pace? What are the risks posed by remote and home working, and how do CISOs mitigate them? Over the last year the threat landscape, […]
Zero Trust promises a way to deal with the limitations of perimeter security. But how does it work, and how practical is it? […]
How do we make long-lasting changes to our security? Conventional security training only goes so far. Instead, we need tools and techniques that keep security best practice to the fore. It should be more than […]
Last autumn, Security Insights produced a four-part series on the pandemic, and the challenge it poses to cyber security. We’ve put links to all the episodes here, plus our interview with Amar Singh, from the […]
We spend too much on security technology, and too little on people. Melanie Oldham, of Bob’s Business, argues that needs to change. […]
Series Two of Security Insights starts off by looking at the human side of cyber security. If effective security combines people, process and technology, it’s all too often human factors that let us down. Around […]
In our End of Year Review, editor Stephen Pritchard discusses 2020’s key trends in information security with Amanda Finch, chief executive of the Chartered Institute of Information Security, CIISec. […]
Copyright © 2025 | MH Magazine WordPress Theme by MH Themes