Features 30.05.2023
Anatomy of a Stealthy Cyber Attack: 10 Steps to Take in the Aftermath of a Data Breach
Attack prevention is a much-talked about area of security, but what happens after a breach takes place?
If there’s a topic that floats your boat, click on the options below to explore all related articles.
132 results for "Cyber Risk"
Features 30.05.2023
Attack prevention is a much-talked about area of security, but what happens after a breach takes place?
Features 16.05.2023
There are three categories of hackers particularly interested in targeting the energy sector. Who are they? And what can be done to protect energy?
Blogs & Opinions 12.05.2023
DORA aims to ensure that the financial services industry can withstand and respond to digital risks. Here’s the low-down on the regulation
Features 09.05.2023
Will robots and algorithms replace our jobs? Or are we simply overreacting to the latest tech trend?
Features 04.05.2023
Does your organisation have a ‘Pentagon leaker’? It’s time to find out
Features 02.05.2023
The exposure of the leaked ransom negotiation logs may suggest a failed negotiation, but on closer inspection, many consider it a well-played hand by Royal Mail
Features 28.04.2023
Calls to stop the training of artificial intelligence models could backfire big time. Hear from cybersecurity experts about why.
Features 25.04.2023
The Online Safety Bill has laudable aims, but experts believe it will make UK businesses a huge target by undermining encryption. Phil Muncaster investigates
Blogs & Opinions 19.04.2023
The legal sector has much to gain from using ChatGPT but also much to lose. Lawrence Perret-Hall weighs up the advantages and disadvantages
Features 13.04.2023
The human operating system is flawed and leaves people vulnerable to cyber attack. But mindfulness might be a defence mechanism, finds Etashe Linto
Features 06.04.2023
Elon Musk has run amok since buying Twitter in October 2022. Assured Intelligence takes a look at some of the biggest changes made and the subsequent cybersecurity damage factor
Interviews 04.04.2023
Insurance exasperating ransomware? An immature sector? Savings instead of insurance? Dan Raywood grills Assured’s head cyber broker, Ed Ventham, about the state of cyber insurance
Blogs & Opinions 31.03.2023
Ninety percent of cyber attacks exploit Microsoft Active Directory. This statistic alone should be enough to make CEOs wake up to its challenges, argues Guido Grillenmeier
Features 30.03.2023
Kate O’Flaherty explores why cyber attacks on healthcare organisations are on the rise and makes a diagnosis for a sector under constant attack
Features 23.03.2023
The majority are utterly clueless when it comes to understanding the metaverse, so we’ve compiled a list of seven need-to-know snippets about the next evolution of the internet
Blogs & Opinions 22.03.2023
Cyber insurance is no longer niche, and is a topic that needs to find its way into the boardroom, says Andy Harris
Features 20.03.2023
Eleanor Dallaway gets to the heart of the gender gap by telling the uncut, uncensored and unbelievable stories of five people in the cybersecurity industry
Features 17.03.2023
Cyber attackers are increasingly banking on poor cybersecurity practices in financial institutions, raking in profits thanks to legacy practices and tech.
Features 14.03.2023
Government operations are being created to deal with the ransomware epidemic, but will it be enough to turn the tide?
Features 03.03.2023
Kate O’Flaherty compiles five outrageous cybersecurity predictions for 2023 made by experts with their tongues firmly in their cheeks
Features 23.02.2023
Why are architects and the companies they work with in construction and engineering among those least prepared for a cybersecurity attack?
Features 16.02.2023
Large quantities of sensitive data coupled with chronic under-investment in security have made the legal sector a prime target for cyber criminals.
Features 07.02.2023
Cyber incidents can define a CEO’s career, as can a blush-worthy security faux pas.
Features 07.02.2023
It’s hardly setting the world alight by announcing that determining cyber risk is crucial to a successful cybersecurity response. Kathryn Pick helps to identify how an organisation goes about identifying where that risk lies
Features 01.02.2023
Eleanor Dallaway challenged Callum Booth to take on ChatGPT in a journalism challenge.
Blogs & Opinions 30.01.2023
A story about a cybersecurity mag editor landing in a cyber insurance broker…
Features 20.01.2023
In times of economic instability, the cybersecurity poverty line becomes ever thicker. Dan Raywood offers economically viable advice for cash-strapped businesses
Features 19.12.2022
ESET’s Jake Moore takes on Assured’s Ed Ventham in a debate on cyber insurance
Features 30.11.2022
What do you get when you mix an incident responder, a lawyer and a cyber broker?
Interviews 01.11.2022
Eleanor Dallaway meets commercial tech lawyer extraordinaire Stephanie Lopes…
Features 24.10.2022
When the cyber proverbial hits the fan, is it the CEO who is accountable?
Features 03.10.2022
How can NEDs upskill in cyber to avoid gaps in governance and accountability?