Dan Swinhoe

What is spear phishing? Why targeted email attacks are so difficult to stop

How cyber competitions can help fill the cybersecurity talent shortage

How cyber competitions can help fill the cybersecurity talent shortage

The Cyber Security Challenge Masterclass event helps employers find skilled but non-traditional job candidates.

How to reduce security staff turnover? Focus on culture and people

How to reduce security staff turnover? Focus on culture and people

HM Health Solutions CISO Omar Khawaja reduced security team attrition by focusing on a strong culture and providing effective communication channels to management.

How automation enables a proactive security culture at Bank of England

How automation enables a proactive security culture at Bank of England

The Bank of England security team uses automation to build intellectual capital, freeing up time to be more proactive and to better explain security to business units.

What is a keylogger? How attackers can monitor everything you type

What is a keylogger? How attackers can monitor everything you type

Keystroke logging software is one of the oldest forms of malware, dating back to typewriters. It's still popular and often used as part of larger cyber attacks.

What is digital trust? How CSOs can help drive business

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

What is physical security? How to keep your facilities and devices safe from on-site attackers

What is physical security? How to keep your facilities and devices safe from on-site attackers

Securing premises and devices from physical attacks can be just as challenging as defending against cyber threats. Automation and AI are increasingly used to shore up defenses.

7 warning signs of an insider threat

7 warning signs of an insider threat

While the security industry often focuses on the nation-state and cyber criminals, often some of the biggest dangers are hiding in plain sight within your own company.

GDPR, I choose you! How the Pokémon Company embraces security and privacy by design

GDPR, I choose you! How the Pokémon Company embraces security and privacy by design

Pokémon Go forced the Pokémon Company International to rethink how it approaches security, and now uses GDPR as an enabler.

The state of ICS and IIoT security in 2019

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it.

Why fake data is a serious IoT security concern

Why fake data is a serious IoT security concern

IoT devices create massive amounts of data, all which could be polluted to throw off operations, business decisions, and even machine learning models.

Automating security at AWS: How Amazon Web Services operates with no SOC

Automating security at AWS: How Amazon Web Services operates with no SOC

Amazon Web Services CISO Stephen Schmidt explains the company's recipe for combining security automation with ways to get management and staff to take security seriously.

Load More