Is cybersecurity a disaster science?
In this interview, Megan Samford explains how her background in emergency management influences her approach to cybersecurity in a critical industry.
Read MoreIn this interview, Megan Samford explains how her background in emergency management influences her approach to cybersecurity in a critical industry.
Read MoreAutomated cyberattacks have certain behaviours in common. And you can use those behaviours to identify attacks and stop them from spreading.
Read MoreWhy is cybersecurity for disruptive tech more complicated? It’s got a lot to do with disruptive tech being new tech. Learn more from Majid Malaika (Chief Advisor to H.E. The Vice Governor of SAMA).
Read MoreWesam Alzahir used a reverse engineering process to identify vulnerabilities in thermal printers – and it shows us how useful reverse engineering is to give companies a more complete understanding of their attack surface.
Read MoreWesam Alzahir used a reverse engineering process to identify vulnerabilities in thermal printers – and it shows us how useful reverse engineering is to give companies a more complete understanding of their attack surface.
Read MoreRichard Stiennon (Founder and Chief Research Analyst at IT-Harvest) is a cybersecurity legend. One of the best known security analysts
Read More