Owning your digital footprint

Take control before someone else does. Complementing her previous article on the company’s digital footprint, Rachael West explains threats to your personal digital footprint and how you can own and protect it. Have you ever Googled yourself? You may be surprised by what information you can find about yourself just from a simple online search. […]

Read More
Owning your company’s digital footprint

Your organisation’s credentials are out there for all to see. Marketing messages, business statements, company information and everything written, posted or downloaded leaves a permanent trace in cyberspace. This is your organisation’s digital footprint. It is your online identity, made up of your unique set of traceable online activities, communications and information. Everything that goes […]

Read More
Evolution of threats and phishing

Treating threats as though they’re human – three blips on the threat radar and what you can do about them Constantly changing.Ever more complex.A landscape evolving at break-neck speed. OK, let’s put a pause on the hyperbolic arms race around cyber threats for just a teeny tiny moment. Because the threats themselves aren’t really evolving. […]

Read More
How new regulations could shape the future of the Internet of Things (IoT)

The IoT is here to stay. And it’s growing. The IoT is predicted to grow to more than 64 billion devices by 2025, and as they become more integrated into our lives, we’re also giving them more access to our personal information. But IoT’s increasing popularity means cybercriminals are designing attacks to specifically target its […]

Read More
The ethics of ethical phishing

Getting the ethics of deception right is crucial to conduct ethical phishing in a safe manner. A quick search on the term ‘phishing’ identifies about 80,000 items in Google Scholar; ‘ethical phishing’ returns around 9,700. These results are evidence, primarily, of the many methodologies and strategies employed to understand how and why phishing emails succeed, […]

Read More
SASIG Gateway

The first SASIG Gateway event to support cybersecurity professionals in the early stages of their careers will take place on the Tuesday 26 March. Founded by the Security Awareness Special Interest Group (SASIG), Gateway is a new subscription-free networking forum for junior cybersecurity professionals and those moving into the cybersecurity industry. The Gateway event will […]

Read More
Cybersecurity: Why your board won’t listen

So why exactly isn’t your board listening? Well actually, they are. The problem is that what you are saying and what they are hearing are different things entirely. It may as well be a foreign language. It’s like speaking Vulcan at a Star Wars convention. This isn’t news to most of you. Any CISO worth […]

Read More
Trick or treat: Are you ready for Cyber Security Month?

October – a month hijacked by vampires, werewolves, zombies, ghosts and all the things that go bump in the night. A month that sees us cowering in our homes, fending off the hellish creatures at the door with chocolate bars and jelly beans, or in my case, satsumas – thanks a lot, Mrs Patterson… But […]

Read More
The bigger picture – Attracting diversity in security

Attracting diversity in security Diversify and thrive Some say that the case for diversity in security no longer needs to be made. Becoming more inclusive has long since gone from being a ‘nice-to-see’ to a ‘must-have’. However, the discussion around the benefits of diversity in cybersecurity has been drowned out by a single clarion call […]

Read More
A CISO’s guide to the CEO’s difficult questions

It’s a scenario we’re all familiar with: “Good morning, Mr Bailey, please take a seat. The interview will start now.” And although confident I have researched and prepared well, I know some searching questions are coming my way. But I also have a few of my own. After all, a job interview is a two-way […]

Read More
This website uses cookies, by continuing to use the site you agree to using cookies. Continue Privacy Policy