Dan Swinhoe

Dan Swinhoe is UK Editor of CSO Online. Previously he was Senior Staff Writer at IDG Connect.

Deadline for UK CSO30 Awards entries extended

Deadline for UK CSO30 Awards entries extended

Nominations now open to recognise the UK’s leading senior cybersecurity professionals.

12  hottest new cybersecurity startups at RSA 2020

12 hottest new cybersecurity startups at RSA 2020

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. These are some of the more interesting startups coming out of stealth.

Insurer pays ransomware demand, freezes account to reclaim later

Insurer pays ransomware demand, freezes account to reclaim later

In a legal first, a cyber insurer gets a UK court to freeze a bitcoin wallet associated with a ransomware payment.

Huawei, 5G and the UK: What is the real risk for enterprises?

Huawei, 5G and the UK: What is the real risk for enterprises?

Secret backdoors might not be the biggest worry when it comes to 5G. Here's what you need to know about security risks around Huawei and 5G in general.

The CSO guide to top UK cybersecurity events

The CSO guide to top UK cybersecurity events

Your list of essential security events in the UK and Europe.

Risk profiling gives PPD real-time view of vulnerabilities

Risk profiling gives PPD real-time view of vulnerabilities

How drug development company PPD built its own risk profiling tool to give all stakeholders a simpler, clear view of risk associated with every IT asset.

How one law firm made security a business development opportunity

How one law firm made security a business development opportunity

Mark Walmsley, CISO at international law firm Freshfields, says a proactive approach to security helps the business win clients and gets its lawyers to embrace security.

The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting.

To fight phishing, focus on changing behaviour

To fight phishing, focus on changing behaviour

Preventing phishing attacks requires more than just security awareness efforts. Vocalink CSO Andrew Rose explains how to change employee behaviour when confronted with phishing email.

How the Tour de France secures its broadcast from disruption

How the Tour de France secures its broadcast from disruption

Few sporting events have the scale and logistics challenges that the Tour de France presents. Event organizer ASO uses the cloud and tight physical security to avoid cyberattacks and broadcast integrity.

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.

Vulnerability management requires good people and patching skills

Vulnerability management requires good people and patching skills

Multinational construction materials maker LafargeHolcim focuses hard on patching to prevent potential exploits further down the line.

7 security incidents that cost CISOs their jobs

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity.

What does the NCSC do and how can it help UK enterprises?

What does the NCSC do and how can it help UK enterprises?

The UK’s National Cyber Security Centre (NCSC) has a wide remit and range of initiatives and services. How can UK enterprises work with the NCSC to make their own networks more secure?

How Virgin Hyperloop One protects its most precious data

How Virgin Hyperloop One protects its most precious data

VHO's high profile means its intellectual property is coveted by competitors, nation-states and curious hackers. Tightly controlled access is the key to protecting that data.

Why BT's red team strikes for real

Why BT's red team strikes for real

UK-based BT's red team conducts attacks on live systems without informing the rest of the business or the blue team defending it. BT Group CSO Les Anderson says this is key to the company's proactive approach to security.

What it takes to be an interim CISO

What it takes to be an interim CISO

Being an interim or virtual CISO (vCISO) comes with many of the same demands of permanent security leadership roles, but also has its own unique challenges and rewards.

How holiday group Tui makes security awareness a company-wide effort

How holiday group Tui makes security awareness a company-wide effort

Enlisting security awareness advisors from each group in the organization is a force multiplier for driving better security behaviors.

How much does it cost to launch a cyberattack?

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low.

Wargaming at Exeter helps keep the university battle ready

Wargaming at Exeter helps keep the university battle ready

Alan Hill of the University of Exeter says more universities need to understand who is targeting them and why to improve cybersecurity defenses and improve incidence response.

Load More