-
The Push for Private-Public Partnerships in Future UK Cybersecurity Plans.
-
The first trend cited in our recently released 2022 AppSec Trends report is Securing the Software Supply Chain. However, concern about inadequacies of software suppliers’ capabilities to build/deliver ...
-
On the 19th July 2024, many people across the world woke up to IT error messages and the so-called ‘blue screen of death’. This left many organisations unable to run as usual, disrupting services and ...
-
–what OSSTM, NIST and OWASP stand for, and why these three pentesting methodologies are so vital for your business-
-
To bounce back to shape after disruptive events, and even grow in times of adversity is often labelled as ‘being resilient’ – a term that seems to be on everyone’s agenda these days, and cyber securit ...
-
International Cyber Expo exhibitor and award-winning, female-led, educational organisation that re-skills adults into cyber security professionals, CAPSLOCK has launched a new campaign to encourage a ...
-
OVER A THIRD OF PARENTS DO NOT KNOW WHAT ONLINE ACCOUNTS THEIR CHILDREN USE
-
During the first day of International Cyber Expo 2022 (27th September), Digital Security by Design sponsored a roundtable with 10 senior cybersecurity professionals, from CISOs to Lead Cyber Security ...
-
40% of Parents Believe Children Will Turn to Cyber Crime During Cost of Living Crisis
-
The cyber security landscape in 2024 is fraught, and less secure than ever. The well-worn phrase of “It’s not if your business experiences a cyber attack, but when” remains true, and is unlikely to ch ...
-
We live in times of frequent change, both good and bad. In no other sector is this exemplified more obviously than cybersecurity. In less than 100 years we’ve gone from the first commercially availabl ...
-
When approaching cybersecurity practitioners about the impact of malware infections in the mid-2010s, I was commonly met with some level of indifference. At the time, malware didn’t seem to be more th ...
-
Figure 1: Fortinet Security Operations Platform A world where cybercriminals can launch large-scale, sophisticated attacks with the push of a button is becoming a reality with the advancements in Ar ...
-
In today’s age of explosive technological change, application programming interfaces (APIs) are the go-to connectors and building blocks for innovative services and customer offerings. Widely used amo ...
-
An organisation’s network is complicated. There are hundreds, if not thousands, of hidden entry points that are attractive in routes for malicious actors. External Attack Surface Management (EASM) is ...
-
We are thrilled to be planning the upcoming two-day Global Cyber Summit at International Cyber Expo 2023. As we reflect and review the many call for paper submissions for this year, it is evident the ...
-
We face an exciting evolution in the cybersecurity sector.
-
Parents Leniency Puts Children at Risk Online Quarter of Parents Allow Children to Use Online Platforms IIl-suited to their Age Group
-
Businesses must arm themselves against the ransomware attack business model emerging within the market
-
While use of collaboration tools is on the rise, email remains the top communication tool for workers as well as the top entry point for cyberthreats. By Thom Bailey, Mimecast
-
London, UK - 20 October 2022 - With over 4,500 visitors from countries including the UK, Ireland, Tanzania, United Arab Emirates, Philippines, United States, and others, plus 130+ exhibitors, Nineteen ...
-
The important movers and shakers from the cyber security world will be coming together at the International Cyber Expo this month.
-
The Clop ransomware gang certainly made some noise in June, and we suspect they will continue to do so into July 2023. Following a vulnerability discovery in Progress Software’s MOVEit file transfer a ...
-
Advisory Council brings together a distinguished and diverse group of cybersecurity experts creating an event made for the community, by the community