Security Insights

Security Insights

Putting security in focus

  • Home
  • About Security Insights
  • Guest bookings
  • Contacts

Articles by admin

Image of Ukraine and data
podcast

Ukraine, geopolitics and cyber threats

December 22, 2022 admin

Russia’s invasion of Ukraine has brought war to the European continent once again. And the conflict has, inevitably, brought an increase in cyber attacks against both Ukraine and its supporters. That those attacks have not […]

podcast

Fake apps and novel phishing attacks

December 7, 2022 admin

Phishing poses a significant threat to all organisations, despite steps taken by security firms to counter it. Malware detection tools, and security awareness campaigns, have improved our ability to detect and block phishing attacks. Even […]

Image of earth with data
podcast

5G: Revolution or security risk?

November 24, 2022 admin

For business, 5G technology promises to replace both wired and wireless networks, inside the business and beyond. The idea of a single network technology with the speeds of a wired connection, and without some of […]

podcast

Neurodiversity, neurodivergence and cyber

November 3, 2022 admin

There’s said to be some 3.5 million unfilled jobs in cybersecurity. So organisations are having to look beyond their conventional methods, and talent pools, to fill vacancies. Until recently, though, little attention was paid to […]

podcast

Cyber’s $150bn black hole: operationalising cybersecurity

October 20, 2022 admin

Spending on cybersecurity seems to rise every year. One estimate, from analysts Gartner, puts global spending at $150bn. But does that spending actually protect us? And does it represent an investment, or just a sunk […]

Abstract malicious code image
podcast

DDoS’ shifting focus: war, religion and politics

October 5, 2022 admin

DDoS attacks remain a threat to any organisation operating online. And over the last six to twelve months, security researchers have seen a shift in the pattern of denial of service attacks. This is being […]

Log in screen
Featured Post

Why do we love weak passwords?

September 21, 2022 admin

Everyone — supposedly — knows about the need to use strong passwords. But convincing consumers, and firms, to use stronger passwords remains a struggle. What, then, are the password policies of the leadings websites and […]

podcast

Risk or reward: can we control cyber risks?

September 8, 2022 admin

Can we ever control cyber risks? And how do cyber risks stack up, against the other challenges facing business? Cyber threats have risen steadily over the last few years, due in part to changes in […]

People shaking hands
podcast

Closing the skills gap – part 4: Michael Smith, Neustar

August 25, 2022 admin

Are firms failing to hire the right people for cybersecurity roles? The issue of the skills shortage is well documented. There is less discussion of the “hiring gap”. Some organisations are failing to fill vacancies; […]

Image of woman with computer code
podcast

Closing the skills gap – part 3: Karen Worstell, VMWare

August 9, 2022 admin

How early do we need to start to awaken interest in cybersecurity, and indeed technology, as a career? As the industry continues to face a skills shortage, employers and educators are looking more closely at […]

Posts pagination

« 1 … 7 8 9 … 15 »

Recent Posts

  • Balancing risk and security: Rich Seiersen
  • Cyber Security Foundations: security by the book
  • Cybersecurity Skills: Veterans in cyber
  • Verizon’s DBIR: tracking security threats
  • Beyond the Titanic: Cybersecurity in Northern Ireland

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • May 2019

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Subscribe to Podcast

Androidby EmailRSS
  • Privacy policy
  • Cookie policy (UK)

Copyright © 2025 | MH Magazine WordPress Theme by MH Themes

Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}