Features 25.07.2023
Investing in Cybersecurity: Are Execs Protecting Their Bonus Rather Than Their Organisation?
It’s time to call a spade a spade. What’s really behind an executive’s cybersecurity investment decisions?
Features 25.07.2023
It’s time to call a spade a spade. What’s really behind an executive’s cybersecurity investment decisions?
Features 20.07.2023
Aggregate cyber risk should inform executive cyber strategy and help insurers to price cyber policies more accurately. Here’s how…
Features 13.07.2023
There are five categories of cyber scams that can fool even the shrewdest of people. Here’s how not to get caught out.
Features 11.07.2023
If you don’t have time to read all 89 pages of the Verizon’s DBIR, Assured Intelligence has pulled out the highlights in a five-minute read
Features 06.07.2023
From Americold to SolarWinds, logistics companies have been, and continue to be, vulnerable to cyber attacks. Eugene Yiga investigates
Features 04.07.2023
How can organisations bolster their cybersecurity against nation-state threats?
Features 29.06.2023
Assured Intelligence has taken a look at some of the companies that have gone out of business due to a cyber-attack to bring you the low-down on what happened in each case.
Features 20.06.2023
How brutal are the cybersecurity cuts compared to attrition in the broader tech sector, and how much will the layoffs in cybersecurity jobs metastasise to the broader economy?
Features 15.06.2023
The ransomware attack on ION is a stark reminder of the increasing cyber threats that financial institutions face.
Features 12.06.2023
What are the merits of penetration testing versus bug bounty programmes, and which approach enhances overall security most effectively?
Features 01.06.2023
Celebrated instances of botnet takedowns and cyber crime indictments often rely on major cybersecurity vendors for intelligence and expertise. But can the government bring cyber criminals to justice without the backing of the private sector? Dan Raywood investigates Earlier this year, Assured Intelligence considered global law enforcement’s response efforts to ransomware. We questioned whether there […]
Features 30.05.2023
Attack prevention is a much-talked about area of security, but what happens after a breach takes place?
Features 25.05.2023
Personal cases against executives over cybersecurity issues are on the increase. Is it still safe to be a CISO?
Features 23.05.2023
Clear, concise and transparent communication can help limit the damage to a firm’s reputation following a cyber-attack, but it’s not easy to get right
Features 16.05.2023
There are three categories of hackers particularly interested in targeting the energy sector. Who are they? And what can be done to protect energy?
Features 09.05.2023
Will robots and algorithms replace our jobs? Or are we simply overreacting to the latest tech trend?
Features 04.05.2023
Does your organisation have a ‘Pentagon leaker’? It’s time to find out
Features 02.05.2023
The exposure of the leaked ransom negotiation logs may suggest a failed negotiation, but on closer inspection, many consider it a well-played hand by Royal Mail
Features 28.04.2023
Calls to stop the training of artificial intelligence models could backfire big time. Hear from cybersecurity experts about why.
Features 25.04.2023
The Online Safety Bill has laudable aims, but experts believe it will make UK businesses a huge target by undermining encryption. Phil Muncaster investigates
Features 17.04.2023
Should CEOs succumb to addictive and trendy TikTok in the hope of captivating an entirely new potential customer base? Callum Booth looks at the pros and cons of CEOs having a presence on TikTok
Features 13.04.2023
The human operating system is flawed and leaves people vulnerable to cyber attack. But mindfulness might be a defence mechanism, finds Etashe Linto
Features 06.04.2023
Elon Musk has run amok since buying Twitter in October 2022. Assured Intelligence takes a look at some of the biggest changes made and the subsequent cybersecurity damage factor
Features 30.03.2023
Kate O’Flaherty explores why cyber attacks on healthcare organisations are on the rise and makes a diagnosis for a sector under constant attack
Features 28.03.2023
Gordon Smith challenges the inappropriate rhetoric of the cybersecurity industry
Features 23.03.2023
The majority are utterly clueless when it comes to understanding the metaverse, so we’ve compiled a list of seven need-to-know snippets about the next evolution of the internet
Features 20.03.2023
Eleanor Dallaway gets to the heart of the gender gap by telling the uncut, uncensored and unbelievable stories of five people in the cybersecurity industry
Features 17.03.2023
Cyber attackers are increasingly banking on poor cybersecurity practices in financial institutions, raking in profits thanks to legacy practices and tech.
Features 14.03.2023
Government operations are being created to deal with the ransomware epidemic, but will it be enough to turn the tide?
Features 07.03.2023
CISO turnover is high, and a tenure rarely exceeds two years. But why? Dan Raywood investigates the concerning trend of the great CISO resignation
Features 03.03.2023
Kate O’Flaherty compiles five outrageous cybersecurity predictions for 2023 made by experts with their tongues firmly in their cheeks
Features 23.02.2023
Why are architects and the companies they work with in construction and engineering among those least prepared for a cybersecurity attack?
Features 16.02.2023
Large quantities of sensitive data coupled with chronic under-investment in security have made the legal sector a prime target for cyber criminals.
Features 15.02.2023
Many have been quick to reprehend Royal Mail for its handling of the recent cyber attack. Gordon Smith analyses the response to deliver a verdict on Royal Mail’s operation
Features 10.02.2023
Alex Meehan looks at ways to crack the password conundrum
Features 07.02.2023
Cyber incidents can define a CEO’s career, as can a blush-worthy security faux pas.
Features 07.02.2023
It’s hardly setting the world alight by announcing that determining cyber risk is crucial to a successful cybersecurity response. Kathryn Pick helps to identify how an organisation goes about identifying where that risk lies
Features 01.02.2023
Eleanor Dallaway challenged Callum Booth to take on ChatGPT in a journalism challenge.
Features 31.01.2023
How long does it take to settle an insurance claim resulting from arguably the most infamous malware attack of all time?
Features 20.01.2023
In times of economic instability, the cybersecurity poverty line becomes ever thicker. Dan Raywood offers economically viable advice for cash-strapped businesses
Features 01.01.2023
Burn-out is often a CEO’s dirty little secret. Eleanor Dallaway investigates
Features 19.12.2022
ESET’s Jake Moore takes on Assured’s Ed Ventham in a debate on cyber insurance
Features 30.11.2022
What do you get when you mix an incident responder, a lawyer and a cyber broker?
Features 17.11.2022
What impact will the recession have on cybercrime? Eleanor Dallaway finds out
Features 24.10.2022
When the cyber proverbial hits the fan, is it the CEO who is accountable?
Features 19.10.2022
Eleanor Dallaway dissects the role of a cyber-NED, if you want to call it that…
Features 03.10.2022
How can NEDs upskill in cyber to avoid gaps in governance and accountability?
Features 24.08.2022
The first 24 hours post cyber incident are critical: This is the inside scoop.