Featured

Resilience: Firms Fail to Grasp Cyber Financial Impact

Resilience and YouGov survey reveals 74% of mid to large UK businesses face cybercrime, while ransomware understanding lags behind data breach concerns

Splunk: CISOs Face Mental Health Crisis Amid Cyber Attacks

Third of security chiefs report stress and overwork as cyber breaches rise to 50% of UK businesses, according to research from cybersecurity firm Splunk

Cyber Security

SonicWall and CrowdStrike Unite for SMB Security Service

SonicWall partners with endpoint protection specialist CrowdStrike to offer managed detection and response capabilities through managed service providers

Network Security

Zscaler Research Shows 87% of Cyber Threats Use Encryption

Security cloud provider Zscaler's analysis reveals manufacturing sector faces surge in encrypted attacks, with threat actors exploiting HTTPS channels

Cloud Security

FS-ISAC CISO Talks Cyber Strategies for Financial Providers

Cyber Security

Veeam's Strategic Expansion and Cyber Resilience

Cyber Security

Interviews中国幸运飞行艇2025年最新消息-飞艇168官方开奖号码|幸运飞船168开奖网

View all
Featured

Graham Thomson

CISO at Irwin Mitchell

Graham Thomson reveals the numerous challenges and opportunities keeping him up at night as CISO at UK-based legal powerhouse Irwin Mitchell

Read More

Steve Lorimer

Group Privacy & Information Security Officer

Hexagon’s Steve Lorimer explains how the enterprise created a strategy of centralisation and vetting to ensure high-level security in its operations

Read More
“We've had an AI innovation team for many years who build AI into our own products and deploy it for our customers' benefit.”
Steve Lorimer
Group Privacy & Information Security Officer

Eric Hussey

Senior Vice President and Chief Information Security Officer at Finastra

Eric Hussey, Senior Vice President and Chief Information Security Officer at Finastra, discusses his 25+ years in the cybersecurity space

Read More

Christiaan Beek

Senior Director of Threat Analytics at Rapid7

Senior Director of Threat Analytics Christiaan Beek explains how Rapid7 utilise threat intelligence to thwart the attacks of today and tomorrow

Read More

Sean Dyon

Director of Strategic Alliances at HID Global

Enhance enterprise security with passkeys, increasing workforce productivity and fortifying defences with HID

Read More

Graham Thomson

CISO at Irwin Mitchell

Graham Thomson reveals the numerous challenges and opportunities keeping him up at night as CISO at UK-based legal powerhouse Irwin Mitchell

Read More

Top 10幸运飞行艇开奖记录168

View all

Top 10 Biggest Network Security Companies

With networks become even bigger and more complex, Cyber Magazine examines the top 10 biggest network security companies so readers can see what's on offer

Top 10: CISOs

With CISOs leading the security posture of a company, Cyber Magazine examines the top 10 CISOs who exemplify excellence in the field

Top 10 Best Phones for Cybersecurity

Cyber Security

Top 10 Largest Cybersecurity Companies

Cyber Security

Cyber Security

View all

OpenText Partnership Targets Software Supply Chain Fears

OpenText partners with Secure Code Warrior to address rise in supply chain attacks through enhanced security training for coders and adoption of DevSecOps

OpenText Partnership Targets Software Supply Chain Fears

Darktrace Reports 692% Surge in Black Friday Cyber Scams

Gen Reports 614% Rise in Command Prompt Manipulation Scams

SAVE THE DATE – Cyber LIVE London 2025

Cyber LIVE London is Co-Located with Tech & AI LIVE London

Network Security

View all

GTT: Why IT Leads Are Turning to SASE to Assuage Cyber Fears

A GTT report shows what are the growing threats concerning IT leads and why many of them are turning to SASE or SSE solutions to manage them

GTT: Why IT Leads Are Turning to SASE to Assuage Cyber Fears

Netskope SSE: Unifying Microsoft Entra Suite Security

Zscaler: Powering a New Era of Zero Trust with Segmentation

How Cisco is securing the NFL’s Global Expansion

AI-Native Edge: Juniper Networks Vision of Networking

Videos

View all
Featured

Claroty: protecting society with cyber-physical security

Simon Chassar, Chief Revenue Officer, Claroty, reflects on the last two years, the maturity landscape of those in industrial sectors and Industry 5.0

Cyber Security

Finastra: Secure, Resilient Software for Financial Services

Cyber Security

HID: Powering Trusted Identities

Cyber Security

How Irwin Mitchell Developed a Robust Cybersecurity Strategy

Application Security

View all

Securing Sensitive Business Data with Arctic Wolf & iManage

Security leader Arctic Wolf launches an integration with iManage to secure knowledge workers and protect sensitive data and business-critical applications

QR ‘Quishing’ scams: Do you know the risks?

Could passkeys be the start of a passwordless future?

OT Security

View all

Ivanti: Social Engineering a Threat on Supply Chain Security

Ivanti's Supply Chain and Warehouse Trends in 2024 study examines how an alarming number of attacks on the supply chain sector came from social engineering

Ivanti: Social Engineering a Threat on Supply Chain Security

DARPA, BBN Technologies and the Cyber Imperative for CPM

Why the Financial Sector Faces AI-driven Cybersecurity Debt

GDIT Report: IT Decision-Makers Waking up to Quantum Reality

DNV & CyberOwl Join to Give Shipping Huge Cyber Offering

Events

View all

TechEx Global 2025

9 Events, 2 Days, 1 Ticket.

Register now

Webinar: Are You Ready for AI-Enhanced Cyber Threats?

Join us for a 45-minute discussion on how to transform your SOC to eliminate siloes and gaps that invite threats.

Register now

How to Leverage CTEM For Enhanced Cybersecurity

Continuous Vigilance: How to Leverage CTEM For Enhanced Cybersecurity | Thursday, June 27, 2024 · 3:00 p.m. London (GMT +1:00)

Register now

DEVOPS LIVE 2024

DEVOPS LIVE 2024, 6-7 March 2024

Register now

Cloud & Infrastructure

View all

AWS Targets Cloud Security with Incident Response Platform

AWS launches automated security response platform across 12 regions to help organisations handle account takeovers and ransomware attacks in real-time

AWS Targets Cloud Security with Incident Response Platform

Clumio: Examining Commvault’s Object Storage Recovery Tool

What a Schwarz & Google Alliance Brings Cloud Security

Rebalancing Act: Trend Micro's Eva Chen on Industry's Issues

Tenable Findings Reveal 'Toxic Cloud Triad’ Enterprises Face

Tech & AI

View all

Cyber LIVE London - The Agenda

Everything you need to know ahead of Cyber LIVE, in co-location with Tech & AI LIVE London Global Summit, next year

KnowBe4 Launches AI Agents to Counter Phishing Threats

SAVE THE DATE – Tech & AI LIVE London Global Summit 2025