Features 23.04.2024
Logistics Uncovered: Understanding the Cyber Threat to Physical Supply Chains
After KNP declared bankruptcy following a ransomware attack last year, we investigate the top cyber risks facing the logistics sector.
If there’s a topic that floats your boat, click on the options below to explore all related articles.
83 results for "Cyber Risk"
Features 23.04.2024
After KNP declared bankruptcy following a ransomware attack last year, we investigate the top cyber risks facing the logistics sector.
Features 18.04.2024
A Microsoft developer recently discovered one of the most sophisticated software supply chain attacks ever conceived.
Interviews 16.04.2024
Eleanor Dallaway ticks off another bucket list interviewee: the enigma that is @cybersecuritymeg
Features 12.04.2024
The CEO of Coalition turned heads with his candid “We’ve long declined to organisations using vulnerable Ivanti appliances” comment last week.
Blogs & Opinions 11.04.2024
Any faith in the ability of governments to deal with deepfakes is misplaced
Features 09.04.2024
More than two billion people, including UK and US citizens, are set to head to the polls this year, which invites plenty of speculation about the security of the voting process.
Features 03.04.2024
The MOVEit file transfer software impacted tens of millions of end customers
Features 21.03.2024
Phil Muncaster investigates why an industry that deals in knowledge is particularly exposed to info theft and extortion
Blogs & Opinions 19.03.2024
What’s changed in the ransomware landscape in 2024? Chris Rogers considers the psyche of those writing the code and looks at new tactics, tools and the prevalence of double-extortion ransomware The cybersecurity ecosystem moves at an extremely rapid pace. However, in the months ahead, it seems inevitable that organisations will be faced with even more […]
Features 14.03.2024
A month ago, my car was hacked and stolen in the middle of the night. So, for the first (and hopefully last) time, I’m the subject of my own article. First things first: If specifying the make of my car in the title comes across as crass, that is not my intent. I did it […]
Features 12.03.2024
Untangling the nuances of liability regimes for software makers that rush code to market.
Features 05.03.2024
How BEC is becoming a bigger threat and what you can do about it
Features 01.02.2024
Take it with more than a pinch of salt, artificial intelligence should be at the top of every CISO’s watchlist for 2024
Blogs & Opinions 30.01.2024
Which is more effective in improving a company’s cybersecurity posture?
Blogs & Opinions 11.01.2024
There are three ways that CISOs can use security data lakes to drive accountability.
Features 02.01.2024
When an AI-enabled voice cloning cyber attack fools a branch manager into transferring £27m out of the business, it’s time to pay attention to the new cyber weapon
Blogs & Opinions 28.12.2023
Dave Greenfield believes in the power of converged networking and security teams, and he’s put pen to paper to explain why The convergence of networking with security forms a pivotal foundation in protecting IT infrastructures against the ever-evolving landscape of cyber threats. This union not only safeguards sensitive data and critical resources, but also bolsters […]
Blogs & Opinions 26.12.2023
Forty per cent of enterprise apps involve uploading content, code, files, or spreadsheets for AI assistance. This raises huge data leakage questions.
Features 21.12.2023
Assured Intelligence talks to hacktivist group GhostSec to get its perspective on industrial control system threats
Features 14.12.2023
Six lessons that all businesses should take from the Allen & Overy ransomware incident
Features 07.12.2023
Who’s legally liable when aggregation site customers are targeted by hackers?
Blogs & Opinions 05.12.2023
One year older, but is it one year wiser?
Features 30.11.2023
Is there any such thing as ransomware that’s ‘not so bad’?
Features 21.11.2023
Sony’s reputation has taken a bashing over the last few months after it was hit by two high-profile breaches.
Features 16.11.2023
Fraudsters continue to adapt their business email compromise techniques to make a fortune
Features 07.11.2023
The high-stakes, high-traffic days of Black Friday and Cyber Monday promise skyrocketing sales but also lurking cyber attacks
Blogs & Opinions 03.11.2023
Keep your friends close, and your insiders closer…
Features 31.10.2023
It’s time to get your incident response ducks in a row…
Features 26.10.2023
Top trends include ransomware, nation-state attacks and business email compromise
Features 17.10.2023
Assured Intelligence introduces seven hacking groups that have risen to infamy, running amok in global networks and leaving a trail of disruption
Features 10.10.2023
Is a successful password strategy the tech equivalent of the Holy Grail?
Features 05.10.2023
Edward Snowden put the term ‘insider threat’ firmly on the map in 2013. A decade later, insiders are still running amok…
Blogs & Opinions 03.10.2023
The stakes just got higher in the world of cyber espionage.
Features 26.09.2023
Given Northern Ireland’s deeply troubled political climate, the stakes are high in the aftermath of the PSNI breaches
Features 14.09.2023
Patching security holes is an exhausting but essential part of risk management. Assured Intelligence looks at some of 2023’s biggest security flaws
Features 12.09.2023
The UK government is warning about rising cyber risk levels. Should we be worried?
Features 07.09.2023
The retail sector has made headlines due to many high-profile (and costly) data breaches. What can retailers do to stay clear of the front pages?
Features 31.08.2023
Supply chain risk is responsible for a lot of those big-ticket cyber headlines. What can you do about it?
Features 22.08.2023
How can execs protect their business from becoming a victim of ransomware?
Features 03.08.2023
If you don’t know where you stand with the spyware threat, read on…
Blogs & Opinions 01.08.2023
Generative AI is transforming financial services, and Olivier Bessi is considering the opportunities and the risks that this evolution entails
Features 25.07.2023
It’s time to call a spade a spade. What’s really behind an executive’s cybersecurity investment decisions?
Blogs & Opinions 21.07.2023
They say good things come in threes. This is my third content and marketing gig working in tech, but this time it’s different. It’s cyber. Only cyber. Or to be more specific, cybersecurity. There’s no data engineering, JavaScript, manual testing, SQL or business analysis to fall back on. Just scary, unknown, cybersecurity Everywhere I’ve worked […]
Features 13.07.2023
There are five categories of cyber scams that can fool even the shrewdest of people. Here’s how not to get caught out.
Features 11.07.2023
If you don’t have time to read all 89 pages of the Verizon’s DBIR, Assured Intelligence has pulled out the highlights in a five-minute read
Features 06.07.2023
From Americold to SolarWinds, logistics companies have been, and continue to be, vulnerable to cyber attacks. Eugene Yiga investigates
Features 04.07.2023
How can organisations bolster their cybersecurity against nation-state threats?
Features 29.06.2023
Assured Intelligence has taken a look at some of the companies that have gone out of business due to a cyber-attack to bring you the low-down on what happened in each case.
Features 12.06.2023
What are the merits of penetration testing versus bug bounty programmes, and which approach enhances overall security most effectively?
Blogs & Opinions 08.06.2023
Ellen Sundra considers benchmarking, connectivity, scaling and automation.
Interviews 06.06.2023
Professor Alan Woodward’s CV is impressive, to say the least. Equally as impressive as his straight-talking, no-nonsense and highly articulate way of communicating cyber risk. Ladies and Gents, meet Professor Alan Woodward
Features 30.05.2023
Attack prevention is a much-talked about area of security, but what happens after a breach takes place?
Features 16.05.2023
There are three categories of hackers particularly interested in targeting the energy sector. Who are they? And what can be done to protect energy?
Blogs & Opinions 12.05.2023
DORA aims to ensure that the financial services industry can withstand and respond to digital risks. Here’s the low-down on the regulation
Features 09.05.2023
Will robots and algorithms replace our jobs? Or are we simply overreacting to the latest tech trend?
Features 04.05.2023
Does your organisation have a ‘Pentagon leaker’? It’s time to find out
Features 02.05.2023
The exposure of the leaked ransom negotiation logs may suggest a failed negotiation, but on closer inspection, many consider it a well-played hand by Royal Mail
Features 28.04.2023
Calls to stop the training of artificial intelligence models could backfire big time. Hear from cybersecurity experts about why.
Features 25.04.2023
The Online Safety Bill has laudable aims, but experts believe it will make UK businesses a huge target by undermining encryption. Phil Muncaster investigates
Blogs & Opinions 19.04.2023
The legal sector has much to gain from using ChatGPT but also much to lose. Lawrence Perret-Hall weighs up the advantages and disadvantages
Features 13.04.2023
The human operating system is flawed and leaves people vulnerable to cyber attack. But mindfulness might be a defence mechanism, finds Etashe Linto
Features 06.04.2023
Elon Musk has run amok since buying Twitter in October 2022. Assured Intelligence takes a look at some of the biggest changes made and the subsequent cybersecurity damage factor
Interviews 04.04.2023
Insurance exasperating ransomware? An immature sector? Savings instead of insurance? Dan Raywood grills Assured’s head cyber broker, Ed Ventham, about the state of cyber insurance
Blogs & Opinions 31.03.2023
Ninety percent of cyber attacks exploit Microsoft Active Directory. This statistic alone should be enough to make CEOs wake up to its challenges, argues Guido Grillenmeier
Features 30.03.2023
Kate O’Flaherty explores why cyber attacks on healthcare organisations are on the rise and makes a diagnosis for a sector under constant attack
Features 23.03.2023
The majority are utterly clueless when it comes to understanding the metaverse, so we’ve compiled a list of seven need-to-know snippets about the next evolution of the internet
Blogs & Opinions 22.03.2023
Cyber insurance is no longer niche, and is a topic that needs to find its way into the boardroom, says Andy Harris
Features 20.03.2023
Eleanor Dallaway gets to the heart of the gender gap by telling the uncut, uncensored and unbelievable stories of five people in the cybersecurity industry
Features 17.03.2023
Cyber attackers are increasingly banking on poor cybersecurity practices in financial institutions, raking in profits thanks to legacy practices and tech.
Features 14.03.2023
Government operations are being created to deal with the ransomware epidemic, but will it be enough to turn the tide?
Features 03.03.2023
Kate O’Flaherty compiles five outrageous cybersecurity predictions for 2023 made by experts with their tongues firmly in their cheeks
Features 23.02.2023
Why are architects and the companies they work with in construction and engineering among those least prepared for a cybersecurity attack?
Features 16.02.2023
Large quantities of sensitive data coupled with chronic under-investment in security have made the legal sector a prime target for cyber criminals.
Features 07.02.2023
Cyber incidents can define a CEO’s career, as can a blush-worthy security faux pas.
Features 07.02.2023
It’s hardly setting the world alight by announcing that determining cyber risk is crucial to a successful cybersecurity response. Kathryn Pick helps to identify how an organisation goes about identifying where that risk lies
Features 01.02.2023
Eleanor Dallaway challenged Callum Booth to take on ChatGPT in a journalism challenge.
Blogs & Opinions 30.01.2023
A story about a cybersecurity mag editor landing in a cyber insurance broker…
Features 20.01.2023
In times of economic instability, the cybersecurity poverty line becomes ever thicker. Dan Raywood offers economically viable advice for cash-strapped businesses
Features 19.12.2022
ESET’s Jake Moore takes on Assured’s Ed Ventham in a debate on cyber insurance
Features 30.11.2022
What do you get when you mix an incident responder, a lawyer and a cyber broker?
Interviews 01.11.2022
Eleanor Dallaway meets commercial tech lawyer extraordinaire Stephanie Lopes…
Features 24.10.2022
When the cyber proverbial hits the fan, is it the CEO who is accountable?
Features 03.10.2022
How can NEDs upskill in cyber to avoid gaps in governance and accountability?