#TheFutureIsCyber, but the present is male

Zoe Edmeades, TSC’s managing director, examines Tessian’s latest report that shows the desperate need for people to join the industry and the yawning gender gap that still blights it. Around a year and a half ago, I reported in The bigger picture – Attracting diversity in security the claim by the Global Information Security Workforce […]

Read More
Cyber culture in the time of COVID

The shock, the dance and the new normal. It may not have been the virus that they planned for. But CISOs around the world have certainly risen to the challenge of the coronavirus crisis. And this is a crisis with an over-abundance of challenge. There have been the immediate triage efforts: minimising disruption, assuring continuity […]

Read More
Phishing: Big phish, little phish

Landing just one phish can be disastrous. How many times have you heard that it only takes one phishing email to cause damage? That’s because it really does only take one. One email to an employee. One click on a link. One fake website. One password entered. One very happy criminal. What is a ‘typical’ […]

Read More
Let’s wrap it up!

An infosec review of 2019. Lauren Groom looks back over the infosec year and the five key lessons we learned going in to 2020 Throughout 2019 we saw high profile information security incidents and events, from accidental data breaches to ransomware. The threat to Internet of Things (IoT) devices has continued to increase, and phishing […]

Read More
Owning your digital footprint

Take control before someone else does. Complementing her previous article on the company’s digital footprint, Rachael West explains threats to your personal digital footprint and how you can own and protect it. Have you ever Googled yourself? You may be surprised by what information you can find about yourself just from a simple online search. […]

Read More
Owning your company’s digital footprint

Your organisation’s credentials are out there for all to see. Marketing messages, business statements, company information and everything written, posted or downloaded leaves a permanent trace in cyberspace. This is your organisation’s digital footprint. It is your online identity, made up of your unique set of traceable online activities, communications and information. Everything that goes […]

Read More
Evolution of threats and phishing

Treating threats as though they’re human – three blips on the threat radar and what you can do about them Constantly changing.Ever more complex.A landscape evolving at break-neck speed. OK, let’s put a pause on the hyperbolic arms race around cyber threats for just a teeny tiny moment. Because the threats themselves aren’t really evolving. […]

Read More
How new regulations could shape the future of the Internet of Things (IoT)

The IoT is here to stay. And it’s growing. The IoT is predicted to grow to more than 64 billion devices by 2025, and as they become more integrated into our lives, we’re also giving them more access to our personal information. But IoT’s increasing popularity means cybercriminals are designing attacks to specifically target its […]

Read More
The ethics of ethical phishing

Getting the ethics of deception right is crucial to conduct ethical phishing in a safe manner. A quick search on the term ‘phishing’ identifies about 80,000 items in Google Scholar; ‘ethical phishing’ returns around 9,700. These results are evidence, primarily, of the many methodologies and strategies employed to understand how and why phishing emails succeed, […]

Read More
SASIG Gateway

The first SASIG Gateway event to support cybersecurity professionals in the early stages of their careers will take place on the Tuesday 26 March. Founded by the Security Awareness Special Interest Group (SASIG), Gateway is a new subscription-free networking forum for junior cybersecurity professionals and those moving into the cybersecurity industry. The Gateway event will […]

Read More
This website uses cookies, by continuing to use the site you agree to using cookies. Continue Privacy Policy