Dan Swinhoe

Dan Swinhoe is UK Editor of CSO Online. Previously he was Senior Staff Writer at IDG Connect.

Where are UK organisations investing their security budgets?

Where are UK organisations investing their security budgets?

Cloud concerns, automation, and human threats are driving security investments in 2019, suggests a CSO study of organisations in the UK.

Morrisons data breach may change the rules around liability in cyber attacks

Morrisons data breach may change the rules around liability in cyber attacks

UK companies may soon be liable for actions of rogue employees, opening them up to massive litigation claims from people affected by data breaches.

If the GDPR fines don’t get you, the personal claims might

If the GDPR fines don’t get you, the personal claims might

With the deadline for mis-sold PPI claims coming to an end, GDPR could become the new cash cow for 'no-win, no-fee' law firms and spur a rise of class action lawsuits.

Safe travels: 7 best practices for protecting data at border crossings

Safe travels: 7 best practices for protecting data at border crossings

Border agents are requesting access to devices and the data on them with no regard to your organization's security policies. Here's how to protect that data and your employees.

Humans are the weak link: Security awareness & education still a challenge for UK companies

Humans are the weak link: Security awareness & education still a challenge for UK companies

A new CSO study of UK organizations suggestions human-centric security is a major priority.

5 ways the FTSE 250 falls down on web security (and 1 where they’re pretty good)

5 ways the FTSE 250 falls down on web security (and 1 where they’re pretty good)

The FTSE 250 is good at keeping internet-facing SMB & Telnet exposure down but has work to do around HTTPS and DMARC.

UK’s biggest cyber-hungry employers revealed

UK’s biggest cyber-hungry employers revealed

Competition for security talent in the UK is fierce, with the big four accounting firms all on a hiring spree.

GDPR vs UK Data Protection Act 2018: What’s the difference?

GDPR vs UK Data Protection Act 2018: What’s the difference?

Each EU member state has to pass its own legislation to actually bring GDPR onto its law books, and each implementation can have its own additions and exemptions. So, what’s special about the UK’s version, the Data Protection Act?

How JustEat finds and trains in-house security talent

How JustEat finds and trains in-house security talent

Employees in other departments might have skills that play well in security and the desire to make the jump. JustEat CISO Kevin Fielder explains how he introduces those people to cybersecurity and integrates them with the team.

CSO Online launches in UK

CSO Online launches in UK

Security is a global problem. But geography matters. Whether that’s local compliance regulations, emerging trends around specific or evolving threats, or even geopolitics influencing which groups might target you, where your...

Has the CISO’s standing within the organisation hit a ceiling?

Has the CISO’s standing within the organisation hit a ceiling?

Despite the continuing increase in intrusions and security budgets, the CISO role has seemingly stalled after growing in importance within the organisation in recent years.

The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.23 billion and counting.

How CISOs become business leaders

How CISOs become business leaders

Security leaders need to master marketing, HR, business lingo and more to really help lead their organizations, says William Hill’s group CISO.

Dark web takedowns make good headlines, do little for security

Dark web takedowns make good headlines, do little for security

Shutting down dark web marketplaces looks and feels good, but it hasn't significantly reduced risk. Worse, it drives cybercriminals to harder-to-track channels.

Telcos around the world hit by long-term intelligence gathering cyberattack

Telcos around the world hit by long-term intelligence gathering cyberattack

Operation Soft Cell saw telcos around the world lose over 100GB of call record data, but it could have been much worse. Attackers could have shut down cell networks if they wanted.

4 tips for building a strong security culture

4 tips for building a strong security culture

Instead of blame and fear, security teams need to create a culture of personal responsibility to best protect data. Here's how two security leaders do it.

Coventry University puts security at the heart of its cloud-first strategy

Coventry University puts security at the heart of its cloud-first strategy

The school goes cloud-first but aims to lead its sector when it comes to cybersecurity.

Why businesses don’t report cybercrimes to law enforcement

Why businesses don’t report cybercrimes to law enforcement

Law enforcement agencies estimate the number of cybercrimes that go unreported by businesses number in the millions. Here why and when you should report breaches and other cyber attacks.

Act fast to recover assets after cyber fraud

Act fast to recover assets after cyber fraud

Here's what companies can do to recover lost assets in the wake of a data theft or a BEC scam.

Haas F1 team leans on service providers as security force multipliers

Haas F1 team leans on service providers as security force multipliers

Formula One racing is expensive and comes with significant security concerns. An outsource-first policy lets a small security team effectively deal with threats at multiple locations.

Load More