Dan Swinhoe

Editor

Dan Swinhoe is UK Editor of CSO Online. Previously he was Senior Staff Writer at IDG Connect.

How to buy Bitcoin for ransomware payment (if you must)

How to buy Bitcoin for ransomware payment (if you must)

Avoid paying ransom demands if at all possible. When you have no choice, follow this advice for acquiring cryptocurrencies and executing the transaction.

UK CSO30 Awards 2020 winners announced

UK CSO30 Awards 2020 winners announced

Congratulations to the 2020 UK CSO30 winners who drive security innovation and deliver business value in their organizations

5 lessons UK CISOs learned from COVID

5 lessons UK CISOs learned from COVID

The COVID crisis is permanently changing the way security organizations protect data and assets. Here's what that means going forward.

How the UK's IR35 tax rules affect interim and virtual CISOs

How the UK's IR35 tax rules affect interim and virtual CISOs

The delayed UK tax rules mean interim CISO positions are becoming less common, and both interims and vCISOs will raise their rates to offset higher taxes.

Shaking off old public sector security perceptions at L&Q Group

Shaking off old public sector security perceptions at L&Q Group

CISO Goher Mohammad discusses how the public sector's approach to security is changing and what the private sector can learn from it.

6 ways CISO recruiting in the UK is broken

6 ways CISO recruiting in the UK is broken

Hiring a CISO? Find the best candidate by avoiding these mistakes.

What UK CISOs need to know about the California Consumer Privacy Act

What UK CISOs need to know about the California Consumer Privacy Act

UK businesses with operations in California or that deal with residents of California may be subject to CCPA. Compliance with GDPR is not enough.

The Data Protection Act 2018 explained: What UK CISOs need to know

The Data Protection Act 2018 explained: What UK CISOs need to know

The UK’s implementation of EU's GDPR shares the same core requirements but has key differences for certain kinds of data and processing.

COVID complicates ISO 27001 audits, creating risk for some UK companies

COVID complicates ISO 27001 audits, creating risk for some UK companies

COVID has made in-person ISO audits more difficult, so companies need to be aware of new rules around remote audits to continue to meet security standards.

Q&A: Modernizing security at Aston Martin

Q&A: Modernizing security at Aston Martin

A self-assessment of the company's security posture revealed a need to replace legacy tools with cloud-based, automated solutions.

What is the cost of a data breach?

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them.

Episode 3: Guiding CISOs through change planning for the new way of working

Episode 3: Guiding CISOs through change planning for the new way of working

Cisco’s CISO expert discusses how companies have been adapting to security challenges during the Coronavirus pandemic.

Episode 2: Reshaping the security strategy for our new way of working

Episode 2: Reshaping the security strategy for our new way of working

COVID-19 has affected organisations of all shapes and sizes. Find out how Brunel University adapted in the face of Coronavirus to secure its remote workforce and what it plans for the future. For more information, visit...

Episode 1: Preparing for the next phase in secure remote working

Episode 1: Preparing for the next phase in secure remote working

Companies scrambled to adopt work from home technologies and policies during the COVID-19 crisis. But will working remotely become a permanent fixture for organisations, how do they need to adapt those temporary measures to ensure...

What is a dictionary attack? And how you can easily stop them

What is a dictionary attack? And how you can easily stop them

A dictionary attack is a targeted form of brute force attack that runs through lists of common words, phrases, and leaked passwords to gain access to accounts.

What the end of Privacy Shield, Brexit mean for UK-US data flows

What the end of Privacy Shield, Brexit mean for UK-US data flows

The fall of US data agreement further complicates the post-Brexit data situation for many companies.

7 steps to securely shutting down business units

7 steps to securely shutting down business units

Closing down parts or all of a business involves more than just decommissioning IT assets. CISOs must lead a holistic effort to ensure data and access aren’t left exposed.

EU court invalidates Privacy Shield data transfer agreement

EU court invalidates Privacy Shield data transfer agreement

US companies receiving EU personal data under Privacy Shield will need to find a replacement legal mechanism, and the decision could affect data protection policies and procedures.

Groups promote Computer Misuse Act update to enable security research

Groups promote Computer Misuse Act update to enable security research

Some in the UK security industry are calling for an update to the CMA to allow them to conduct security research without threat of prosecution.

Protecting high-value research data from nation-state attackers

Protecting high-value research data from nation-state attackers

Recent nation-state campaigns to steal COVID-related research data underscores the threat to all research organizations. The best defense starts with knowing the enemy.

Load More