Stress and resilience: A timeline of mental health in cybersecurity
Look at the last ten years of mental health in cybersecurity – and enter a new era of cyber resilience.
Read MoreLook at the last ten years of mental health in cybersecurity – and enter a new era of cyber resilience.
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreTim Brown (VP and CISO at SolarWinds) guided his organisation through one of the biggest breaches of the 21st century. And his ability to communicate is key to his position as CISO.
Read MoreResearch shows that human error causes 88% of all data breaches. But Ira Winkler (CISO and VP at CYE) explains why blaming the user isn’t good enough. Human error is just a symptom of a problem in the cybersecurity system.
Read MoreShoutout to the new 70 cyber warriors who joined us last week. As a subscriber, you'll be among
Read MoreWojtek Swiatek (VP and CISO at Dassault Systèmes) explains how he went from a physics PhD to a career in cybersecurity.
Read MoreHow do you protect a network that relies on constellations of satellites in orbit around Earth? Stay focused on the most vulnerable endpoints: the ones that users hold in their hands.
Read MoreBeing a thought leader in the cybersecurity industry requires visibility, and social media is a powerful tool for achieving it. Though some may worry about maintaining professionalism online, it's possible to strike the right balance with guidance from experts.
Read More