Last year, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in April, the UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security (DHS) released a...
Read More
1989 was of a year of positive milestones which would have a profound impact on the way we live and work today. The World Wide Web was invented, the Berlin Wall was torn down, and the first GPS satellite went into orbit. However, not everything about the year was a cause for celebration. Alongside...
Read More
If we can take anything from the continuous spate of data breaches, it’s that bad actors and their techniques are more sophisticated than ever and are steamrolling over organisations’ security (or lack thereof) defences. But what’s more intriguing is that despite global increased spending on...
Read More
The threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation...
Read More
IT security professionals continuously have to tackle high levels of security alerts in the global...
Read More
An unfortunate truth in business is that any worker, in any organisation, can be the target of a...
Read More
Jan van Vliet, VP and GM, EMEA, Digital Guardian discusses why switching to a more data-centric...
Read More
Our daily news updates have become littered with data breach after data breach, each costing...
Read More
The US Navy SEALs have a well-known motto: “The only easy day was yesterday.” Taking a look at...
Read More
The role of a chief data officer (CDO) has changed significantly over the past decade. Ten years...
Read More
It has been a tumultuous year for cybersecurity, with endless security breaches hitting the...
Read More
Understanding the risk posed by third- and fourth-party companies can help mitigate security...
Read More