06 Sep 2022
Stan Wisseman, Chief Security Strategist for North America - CyberRes
The first trend cited in our recently released 2022 AppSec Trends report is Securing the Software Supply Chain. However, concern about inadequacies of software suppliers’ capabilities to build/deliver
…
On the 19th July 2024, many people across the world woke up to IT error messages and the so-called ‘blue screen of death’. This left many organisations unable to run as usual, disrupting services and
…
10 Oct 2022
BERTA PAPPENHEIM, CEO & Founder, The CyberFish
To bounce back to shape after disruptive events, and even grow in times of adversity is often labelled as ‘being resilient’ – a term that seems to be on everyone’s agenda these days, and cyber securit
…
International Cyber Expo exhibitor and award-winning, female-led, educational organisation that re-skills adults into cyber security professionals, CAPSLOCK has launched a new campaign to encourage a
…
During the first day of International Cyber Expo 2022 (27th September), Digital Security by Design sponsored a roundtable with 10 senior cybersecurity professionals, from CISOs to Lead Cyber Security
…
The cyber security landscape in 2024 is fraught, and less secure than ever. The well-worn phrase of “It’s not if your business experiences a cyber attack, but when” remains true, and is unlikely to ch
…
We live in times of frequent change, both good and bad. In no other sector is this exemplified more obviously than cybersecurity. In less than 100 years we’ve gone from the first commercially availabl
…
When approaching cybersecurity practitioners about the impact of malware infections in the mid-2010s, I was commonly met with some level of indifference. At the time, malware didn’t seem to be more th
…
Figure 1: Fortinet Security Operations Platform A world where cybercriminals can launch large-scale, sophisticated attacks with the push of a button is becoming a reality with the advancements in Ar
…
20 Sep 2023
Nico Wagemans, Regional VP EMEA at Salt Security
In today’s age of explosive technological change, application programming interfaces (APIs) are the go-to connectors and building blocks for innovative services and customer offerings. Widely used amo
…
An organisation’s network is complicated. There are hundreds, if not thousands, of hidden entry points that are attractive in routes for malicious actors. External Attack Surface Management (EASM) is
…
05 Jun 2023
Philip Ingram MBE, former senior British Military Intelligence Officer and Content Lead for the International Cyber Expo
We are thrilled to be planning the upcoming two-day Global Cyber Summit at International Cyber Expo 2023. As we reflect and review the many call for paper submissions for this year, it is evident the
…
While use of collaboration tools is on the rise, email remains the top communication tool for workers as well as the top entry point for cyberthreats. By Thom Bailey, Mimecast
London, UK - 20 October 2022 - With over 4,500 visitors from countries including the UK, Ireland, Tanzania, United Arab Emirates, Philippines, United States, and others, plus 130+ exhibitors, Nineteen
…
The Clop ransomware gang certainly made some noise in June, and we suspect they will continue to do so into July 2023. Following a vulnerability discovery in Progress Software’s MOVEit file transfer a
…