Founder Shield MD on Navigating Multi-Cloud Complexities
Founder Shield Managing Director Jonathan Selby talks strategies to navigating the complexities of multi-cloud set ups…
Qodea CISO Explains How Cyber Threats Could Outrun Cost
Qodea CISO Business Manager Ed Russell explains how growth in sophistication and volume of attacks means current investment in defences falls short…
Hacking & Malware
Nokia and NL-ix Deploy Europe’s Largest IXP-Based Anti-DDoS
This collaboration between Nokia and NL-ix is unprecedented both being Largest IXP-Based Anti-DDoS, but the first anti-DDoS solution deployed by an IXP…
Network Security
Bridging the Gap: Examining the UK-US Data Bridge
The UK-US Data Bridge was created to replace EU data frameworks and allow the exchange of personal data whilst still adhering to agreed rules…
Data Breaches
Hiddenlayer CSO Tells Why It Made an AI Security Council
Technology & AI
Cooperation Key Theme at Microsoft Endpoint Security Summit
CISO at Evolution Janis Lasmanis walks through the high stakes it deals with in defending online live casinos from falling prey to attacks…
Read More
Sean Dyon
Director of Strategic Alliances at HID Global
Enhance enterprise security with passkeys, increasing workforce productivity and fortifying defences with HID…
Read More
"FIDO is critical because it eliminates shared secrets such as passwords, which are often targeted by phishing attacks."
Sean Dyon
Director of Strategic Alliances at HID Global
Graham Thomson
CISO at Irwin Mitchell
Graham Thomson reveals the numerous challenges and opportunities keeping him up at night as CISO at UK-based legal powerhouse Irwin Mitchell…
Read More
Vonny Gamot
Head of Sales EMEA at McAfee
Cyber Magazine sits down with Vonny Gamot, Head of Sales EMEA at McAfee to find out what one of the premiere antivirus software providers is focusing on.…
Read More
Markus Küchler
Head of IT Security at Epiroc
Markus Kuchler, Head of IT Security at Epiroc, on how it is driving mining innovation and digital transformation with cutting-edge cybersecurity…
Read More
Janis Lasmanis
CISO at Evolution
CISO at Evolution Janis Lasmanis walks through the high stakes it deals with in defending online live casinos from falling prey to attacks…
Read More
Sean Dyon
Director of Strategic Alliances at HID Global
Enhance enterprise security with passkeys, increasing workforce productivity and fortifying defences with HID…
Read More
Graham Thomson
CISO at Irwin Mitchell
Graham Thomson reveals the numerous challenges and opportunities keeping him up at night as CISO at UK-based legal powerhouse Irwin Mitchell…
Read More
Vonny Gamot
Head of Sales EMEA at McAfee
Cyber Magazine sits down with Vonny Gamot, Head of Sales EMEA at McAfee to find out what one of the premiere antivirus software providers is focusing on.…
Read More
Markus Küchler
Head of IT Security at Epiroc
Markus Kuchler, Head of IT Security at Epiroc, on how it is driving mining innovation and digital transformation with cutting-edge cybersecurity…
As cyber threats evolve at breakneck speed, Cyber Magazine unpacks 10 critical strategies that every business must master…
Top 10 Uses of Blockchain in Cybersecurity
With blockchain technology demonstrating strong cybersecurity applications, Cyber Magazine examines the Top 10 Blockchain cybersecurity uses you can deploy…
Why the UK is Listing Data Centres as Critical Cyber Assets
Being Western Europe's leader in number of Data Centres, the UK has decided to take steps to ensure they receive adequate protection from cyber threats…
Why the UK is Listing Data Centres as Critical Cyber Assets
Trustwave Reveals the Financial Sector's Cyber Threats
TCS and Google Cloud Join for Solution to Secure the Cloud
TCS partners with Google Cloud to launch a range of AI-powered cybersecurity solutions to help businesses secure their clouds against advanced threats…
TCS and Google Cloud Join for Solution to Secure the Cloud
Palo Alto Networks Buy IBM's QRadar Assets in Win for SIEM
CrowdStrike Goes to Congress: What Will Come of the Hearing?
CrowdStrike will face a US Congressional hearing about what went caused the global IT outage in a testimonial that could shape future cyber legislation…
CrowdStrike Goes to Congress: What Will Come of the Hearing?
Oasis: How Ticket Sellers can Avoid Disappointing Customers
Elastic's Massimo Merlo Talks Securing Academic AI Research
Dominic Trott: A Resilience-based Cyber Strategy is Needed
Red Hat’s Chris Jenkins on Upping Security with Containers
While containerisation has brought about automation efficiencies and new level of security, Red Hat’s Chris Jenkins warns of the new threats it has brought…
Red Hat’s Chris Jenkins on Upping Security with Containers
Aon Points to Area Diversification as Cloud Risk Strategy
Commvault Integrates Industry Giants into Security Solutions
IT Outages and the Risks of a Cloud Oligopoly
Can Exposure Management Secure the Growing Attack Surface?