If there’s a topic that floats your boat, click on the options below to explore all related articles.
41 results for "Cyber Resilience"
Top trends include ransomware, nation-state attacks and business email compromise
Edward Snowden put the term ‘insider threat’ firmly on the map in 2013. A decade later, insiders are still running amok…
The retail sector has made headlines due to many high-profile (and costly) data breaches. What can retailers do to stay clear of the front pages?
Aggregate cyber risk should inform executive cyber strategy and help insurers to price cyber policies more accurately. Here’s how…
From Americold to SolarWinds, logistics companies have been, and continue to be, vulnerable to cyber attacks. Eugene Yiga investigates
Assured Intelligence has taken a look at some of the companies that have gone out of business due to a cyber-attack to bring you the low-down on what happened in each case.
The ransomware attack on ION is a stark reminder of the increasing cyber threats that financial institutions face.
What are the merits of penetration testing versus bug bounty programmes, and which approach enhances overall security most effectively?
Celebrated instances of botnet takedowns and cyber crime indictments often rely on major cybersecurity vendors for intelligence and expertise. But can the government bring cyber criminals to justice without the backing of the private sector? Dan Raywood investigates Earlier this year, Assured Intelligence considered global law enforcement’s response efforts to ransomware. We questioned whether there […]
Attack prevention is a much-talked about area of security, but what happens after a breach takes place?
There are three categories of hackers particularly interested in targeting the energy sector. Who are they? And what can be done to protect energy?
Blogs & Opinions 14.04.2023
Beth Robinson highlights the additional considerations that those with a double X chromosome may need to take if aspiring to be a professional hacker
Cyber attackers are increasingly banking on poor cybersecurity practices in financial institutions, raking in profits thanks to legacy practices and tech.
Why are architects and the companies they work with in construction and engineering among those least prepared for a cybersecurity attack?
It’s hardly setting the world alight by announcing that determining cyber risk is crucial to a successful cybersecurity response. Kathryn Pick helps to identify how an organisation goes about identifying where that risk lies
Assured Reacts 23.08.2022
The what, why and truth between the lines of Lloyd’s of London’s cyber exclusions