Blogs & Opinions 14.11.2024
Weighing Up Potential Loss and Prevention in the Wake of Crowdstrike and NetworkRail Outages
Conor O’Neill highlights the true cost of a data breach to your company and how businesses can minimise future risks.
If there’s a topic that floats your boat, click on the options below to explore all related articles.
125 results for "Cyber Risk"
Blogs & Opinions 14.11.2024
Conor O’Neill highlights the true cost of a data breach to your company and how businesses can minimise future risks.
Blogs & Opinions 07.11.2024
These blogs will focus on making a tangible difference in a language the business understands. The points are drawn from experience delivering cybersecurity transformation programmes in multiple industries.
Features 31.10.2024
Reports claim that the majority of attributable malware-based attacks are now state-sponsored. What does this mean for CISOs?
Interviews 29.10.2024
Guy Heaton is the senior technical specialist responsible for backup and recovery at Coventry Building Society.
Blogs & Opinions 24.10.2024
There are now 300 identified malware families for macOS.
Features 22.10.2024
On October 3 2024, American Water, the largest water company in the US, discovered it had been hit by a cyber attack
Features 15.10.2024
The NCSC is building “a nation-scale evidence base” for cyber-deception
Interviews 10.10.2024
Jakub Lewandowski is a lawyer, and data privacy and security counsel, currently representing Commvault as its global data governance officer.
Features 08.10.2024
60% of UK CNI organisations have experienced ransomware over the previous year
Features 03.10.2024
Are your employees gamers? And if so, what does that mean for your security posture?
Interviews 01.10.2024
How does one transition from windsurfing instructor to cybersecurity tech director? Dan Bridges knows…
Features 26.09.2024
The British Library has shared a detailed report of the 2023 cyber incident and its aftermath. Assured Intelligence picks out the highlights for our autopsy report
Features 24.09.2024
137 million email addresses were leaked, alongside 272 million social security numbers.
Features 19.09.2024
What do SaaS customers need to do to harness the benefits of the cloud without inviting excessive cyber risk?
Features 05.09.2024
The cost of data breaches is rising. Shadow data is one of the reasons for this.
Blogs & Opinions 03.09.2024
It’s happened. Your organisation is now one of the 70% hit by a cyber attack. What now?
Features 29.08.2024
Cybersecurity is often a ‘grudge purchase’ made after a successful cyber attack has damaged a company, rather than before.
Blogs & Opinions 27.08.2024
The CSR Bill’s current focus on regulatory compliance and incident reporting is vital, but it should strongly emphasise the human factor in cybersecurity.
Features 22.08.2024
The first in our AI Autopsy series…Features that analyse and dissect recent cyber incidents, providing lessons learnt so cybersecurity professionals can avoid history repeating itself
Interviews 21.08.2024
What keeps Cyro Cyber’s CISO up at night? Here’s a spoiler…it’s people!
Features 15.08.2024
Do shipping companies feel anchored down by cyber risk?
Features 13.08.2024
A combination of mis-sold policies, coverage small print, and generalist brokers threaten to do more harm than good.
Blogs & Opinions 08.08.2024
Reflecting on 2024 so far, the cyber danger zones can be divided into key areas.
Interviews 06.08.2024
Chris Denbigh-White is the chief security officer for Next DLP. He gives his hot takes on the cybersecurity industry that stole his heart
Features 01.08.2024
The monthly addition of edge service and infrastructure CVEs rose by 22%. So, how can CISOs protect the edge more effectively?
Blogs & Opinions 30.07.2024
When it comes to protecting healthcare data and systems, the threat is high, and the stakes are even higher, warns Dr. Darren Williams In early June 2024, major London hospitals, including Kings College Hospital and Guy’s and St Thomas’s, declared a critical incident following a ransomware attack on Synnovis, a pathology services provider. This cyber […]
Blogs & Opinions 25.07.2024
The Labour government promised “change” as its big election manifesto theme. Will that stretch to cyber?
Features 16.07.2024
Multiple celebrities and big brands, including Paris Hilton, CNN, and Sony, were hit by the TikTok ‘zero-click’ attack.
Features 04.07.2024
Six NHS trusts in London and countless GP practices in surrounding regions recently suffered major disruption after a ransomware attack
Features 02.07.2024
The PSTI Act came into play in April 2024, aiming to improve resilience for notoriously insecure IoT devices
Features 18.06.2024
With the National Vulnerability Database (NVD) at crisis point, how can CISOs mitigate the risk of vulnerability exposure?
Features 11.06.2024
This incident shows breaches can inadvertently compromise the data of individuals who may not have had a Dropbox account
Interviews 04.06.2024
Dr Jason Nurse names AI as the biggest unsolved problem in cybersecurity. And he believes that good cybersecurity training is the bare minimum for improving cybersecurity posture.
Features 30.05.2024
In a sector focused on building physical things, digital threats have often played second fiddle to physical risks on-site.
Interviews 23.05.2024
BT’s Dave Harcourt is optimistic about AI, hates the cybersecurity ‘ivory tower,’ and cherishes the time he spent working with NCSC’s Ian Levy.
Features 21.05.2024
The (cyber) threat posed by China is well-documented.
Features 14.05.2024
Education was the most attacked sector in the UK in the last six months
Features 09.05.2024
Top security leaders share their three biggest cybersecurity concerns
Features 07.05.2024
We used AI to clone the voices of myself and our CEO to launch a targeted phishing attack on an Assured team member!
Blogs & Opinions 02.05.2024
What exactly is a security culture and how can organisations build and maintain one?
Features 30.04.2024
This five-minute read will be the differentiator if you ever find yourself a victim of iPhone theft.
Features 23.04.2024
After KNP declared bankruptcy following a ransomware attack last year, we investigate the top cyber risks facing the logistics sector.
Features 18.04.2024
A Microsoft developer recently discovered one of the most sophisticated software supply chain attacks ever conceived.
Interviews 16.04.2024
Eleanor Dallaway ticks off another bucket list interviewee: the enigma that is @cybersecuritymeg
Features 12.04.2024
The CEO of Coalition turned heads with his candid “We’ve long declined to organisations using vulnerable Ivanti appliances” comment last week.
Blogs & Opinions 11.04.2024
Any faith in the ability of governments to deal with deepfakes is misplaced
Features 09.04.2024
More than two billion people, including UK and US citizens, are set to head to the polls this year, which invites plenty of speculation about the security of the voting process.
Features 03.04.2024
The MOVEit file transfer software impacted tens of millions of end customers
Features 21.03.2024
Phil Muncaster investigates why an industry that deals in knowledge is particularly exposed to info theft and extortion
Blogs & Opinions 19.03.2024
What’s changed in the ransomware landscape in 2024? Chris Rogers considers the psyche of those writing the code and looks at new tactics, tools and the prevalence of double-extortion ransomware The cybersecurity ecosystem moves at an extremely rapid pace. However, in the months ahead, it seems inevitable that organisations will be faced with even more […]
Features 14.03.2024
A month ago, my car was hacked and stolen in the middle of the night. So, for the first (and hopefully last) time, I’m the subject of my own article. First things first: If specifying the make of my car in the title comes across as crass, that is not my intent. I did it […]
Features 12.03.2024
Untangling the nuances of liability regimes for software makers that rush code to market.
Features 05.03.2024
How BEC is becoming a bigger threat and what you can do about it
Features 01.02.2024
Take it with more than a pinch of salt, artificial intelligence should be at the top of every CISO’s watchlist for 2024
Blogs & Opinions 30.01.2024
Which is more effective in improving a company’s cybersecurity posture?
Blogs & Opinions 11.01.2024
There are three ways that CISOs can use security data lakes to drive accountability.
Features 02.01.2024
When an AI-enabled voice cloning cyber attack fools a branch manager into transferring £27m out of the business, it’s time to pay attention to the new cyber weapon
Blogs & Opinions 28.12.2023
Dave Greenfield believes in the power of converged networking and security teams, and he’s put pen to paper to explain why The convergence of networking with security forms a pivotal foundation in protecting IT infrastructures against the ever-evolving landscape of cyber threats. This union not only safeguards sensitive data and critical resources, but also bolsters […]
Blogs & Opinions 26.12.2023
Forty per cent of enterprise apps involve uploading content, code, files, or spreadsheets for AI assistance. This raises huge data leakage questions.
Features 21.12.2023
Assured Intelligence talks to hacktivist group GhostSec to get its perspective on industrial control system threats
Features 14.12.2023
Six lessons that all businesses should take from the Allen & Overy ransomware incident
Features 07.12.2023
Who’s legally liable when aggregation site customers are targeted by hackers?
Blogs & Opinions 05.12.2023
One year older, but is it one year wiser?
Features 30.11.2023
Is there any such thing as ransomware that’s ‘not so bad’?
Features 21.11.2023
Sony’s reputation has taken a bashing over the last few months after it was hit by two high-profile breaches.
Features 16.11.2023
Fraudsters continue to adapt their business email compromise techniques to make a fortune
Features 07.11.2023
The high-stakes, high-traffic days of Black Friday and Cyber Monday promise skyrocketing sales but also lurking cyber attacks
Blogs & Opinions 03.11.2023
Keep your friends close, and your insiders closer…
Features 31.10.2023
It’s time to get your incident response ducks in a row…
Features 26.10.2023
Top trends include ransomware, nation-state attacks and business email compromise
Features 17.10.2023
Assured Intelligence introduces seven hacking groups that have risen to infamy, running amok in global networks and leaving a trail of disruption
Features 10.10.2023
Is a successful password strategy the tech equivalent of the Holy Grail?
Features 05.10.2023
Edward Snowden put the term ‘insider threat’ firmly on the map in 2013. A decade later, insiders are still running amok…
Blogs & Opinions 03.10.2023
The stakes just got higher in the world of cyber espionage.
Features 26.09.2023
Given Northern Ireland’s deeply troubled political climate, the stakes are high in the aftermath of the PSNI breaches
Features 14.09.2023
Patching security holes is an exhausting but essential part of risk management. Assured Intelligence looks at some of 2023’s biggest security flaws
Features 12.09.2023
The UK government is warning about rising cyber risk levels. Should we be worried?
Features 07.09.2023
The retail sector has made headlines due to many high-profile (and costly) data breaches. What can retailers do to stay clear of the front pages?
Features 31.08.2023
Supply chain risk is responsible for a lot of those big-ticket cyber headlines. What can you do about it?
Features 22.08.2023
How can execs protect their business from becoming a victim of ransomware?
Features 03.08.2023
If you don’t know where you stand with the spyware threat, read on…
Blogs & Opinions 01.08.2023
Generative AI is transforming financial services, and Olivier Bessi is considering the opportunities and the risks that this evolution entails
Features 25.07.2023
It’s time to call a spade a spade. What’s really behind an executive’s cybersecurity investment decisions?
Blogs & Opinions 21.07.2023
They say good things come in threes. This is my third content and marketing gig working in tech, but this time it’s different. It’s cyber. Only cyber. Or to be more specific, cybersecurity. There’s no data engineering, JavaScript, manual testing, SQL or business analysis to fall back on. Just scary, unknown, cybersecurity Everywhere I’ve worked […]
Features 13.07.2023
There are five categories of cyber scams that can fool even the shrewdest of people. Here’s how not to get caught out.
Features 11.07.2023
If you don’t have time to read all 89 pages of the Verizon’s DBIR, Assured Intelligence has pulled out the highlights in a five-minute read
Features 06.07.2023
From Americold to SolarWinds, logistics companies have been, and continue to be, vulnerable to cyber attacks. Eugene Yiga investigates
Features 04.07.2023
How can organisations bolster their cybersecurity against nation-state threats?
Features 29.06.2023
Assured Intelligence has taken a look at some of the companies that have gone out of business due to a cyber-attack to bring you the low-down on what happened in each case.
Features 12.06.2023
What are the merits of penetration testing versus bug bounty programmes, and which approach enhances overall security most effectively?
Blogs & Opinions 08.06.2023
Ellen Sundra considers benchmarking, connectivity, scaling and automation.
Interviews 06.06.2023
Professor Alan Woodward’s CV is impressive, to say the least. Equally as impressive as his straight-talking, no-nonsense and highly articulate way of communicating cyber risk. Ladies and Gents, meet Professor Alan Woodward
Features 30.05.2023
Attack prevention is a much-talked about area of security, but what happens after a breach takes place?
Features 16.05.2023
There are three categories of hackers particularly interested in targeting the energy sector. Who are they? And what can be done to protect energy?
Blogs & Opinions 12.05.2023
DORA aims to ensure that the financial services industry can withstand and respond to digital risks. Here’s the low-down on the regulation
Features 09.05.2023
Will robots and algorithms replace our jobs? Or are we simply overreacting to the latest tech trend?
Features 04.05.2023
Does your organisation have a ‘Pentagon leaker’? It’s time to find out
Features 02.05.2023
The exposure of the leaked ransom negotiation logs may suggest a failed negotiation, but on closer inspection, many consider it a well-played hand by Royal Mail
Features 28.04.2023
Calls to stop the training of artificial intelligence models could backfire big time. Hear from cybersecurity experts about why.