The zero trust model: does it belong in cybersecurity? 

The global zero trust market is projected to reach a whopping $52 billion by 2026 (CNBC). This market has seen a steep increase in adoption due to a shift to multilocation remote working but is it more of a hinderance than it is a benefit? Does the zero trust model belong in cybersecurity frameworks or […]

Read More
How to consider age in creating a stronger cybersecurity culture

In order to build an effective cybersecurity culture, a mix of technical and human aspects need to be considered. One aspect that’s not always taken under consideration is employee age. Most organisations are staffed by employees drawn from many different demographics and age groups. With a third of senior citizens now planning to continue working […]

Read More
“Mr Ransomware is knocking on the door,” says the man responsible for keeping £57bn of people’s money safe

We recently had the opportunity to speak with Simon Mair, Head of Information Security and Data Privacy, at Brewin Dolphin on their approach to cybersecurity threats. Brewin Dolphin is a financial advice and investment firm with 80,000 clients in the UK, Ireland and Jersey. It has around £57 billion of funds under management. Simon and […]

Read More
Christmas 2021 — (we can’t be the first to mention it, surely?!)

Now is the time to plan your festive cybersecurity campaign Just as we thought it safe to look up after Cyber Security Month (CSM), Christmas is waving at us from the horizon. The festive season is a good opportunity to raise awareness among employees and remind them of the importance of cyber-vigilance. After all, looking […]

Read More
Is cybersecurity awareness important these days?

Some think technology solves all. But even today safety technology-laden cars need a human with enough roadcraft to make them deliver all they can. Firewalls are becoming more sophisticated and AI integration into cybersecurity is more effective than ever before. But does this mean we can relax, put our feet up and forget about training […]

Read More
HR = Cybersecurity = People

HR and cybersecurity have one thing in common — people. Cybersecurity teams must work hand in hand with their HR colleagues to have any chance of success. As a cybersecurity professional, one of your key soft skills is to be a social butterfly. You strive to work across all areas of your organisation. Of course […]

Read More
Build a cybersecurity awareness programme that really works

An effective cybersecurity awareness programme is crucial to the success of CISOs and IT teams. Convincing staff at all levels of the importance of security and the essential proactive steps to take is key to success. But if you’re involved in ensuring the smooth deployment of a cybersecurity awareness programme you will be acutely aware […]

Read More
Cyber attack surfaces are expanding

As businesses move to the cloud and digitisation becomes the norm, the role of the CISO becomes even more complex. Constant growth in technology equates to continuously growing cyber attack surfaces. Cybercriminals have more opportunities than ever to launch attacks and find vulnerabilities in places that may not have even existed before. These expanding cyber […]

Read More
Checklist for the effective CISO

As well as dealing with large-scale, rising cybersecurity threats and establishing secure connections for newly-established remote workforces, CISOs are under pressure to deliver more than just an organisation’s security. How can you, as a CISO ensure cybersecurity for your organisation in these uncertain times? What are the skills required to make an effective CISO of […]

Read More
What are the three main cybersecurity threats you’re facing in 2021?

Since the beginning of the pandemic in 2020, the FBI has noted a fourfold increase in cybersecurity complaints. It’s no surprise. COVID-19 and the resulting shift to remote work have had enormous implications for the world of cybersecurity. For most, it has meant super-accelerated or unplanned cloud migrations and the very swift procurement of IT […]

Read More
This website uses cookies, by continuing to use the site you agree to using cookies. Continue Privacy Policy