Dan Swinhoe

Editor

Dan Swinhoe is UK Editor of CSO Online. Previously he was Senior Staff Writer at IDG Connect.

How the Tour de France secures its broadcast from disruption

How the Tour de France secures its broadcast from disruption

Few sporting events have the scale and logistics challenges that the Tour de France presents. Event organizer ASO uses the cloud and tight physical security to avoid cyberattacks and broadcast integrity.

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.

Vulnerability management requires good people and patching skills

Vulnerability management requires good people and patching skills

Multinational construction materials maker LafargeHolcim focuses hard on patching to prevent potential exploits further down the line.

7 security incidents that cost CISOs their jobs

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity.

What does the NCSC do and how can it help UK enterprises?

What does the NCSC do and how can it help UK enterprises?

The UK’s National Cyber Security Centre (NCSC) has a wide remit and range of initiatives and services. How can UK enterprises work with the NCSC to make their own networks more secure?

How Virgin Hyperloop One protects its most precious data

How Virgin Hyperloop One protects its most precious data

VHO's high profile means its intellectual property is coveted by competitors, nation-states and curious hackers. Tightly controlled access is the key to protecting that data.

Why BT's red team strikes for real

Why BT's red team strikes for real

UK-based BT's red team conducts attacks on live systems without informing the rest of the business or the blue team defending it. BT Group CSO Les Anderson says this is key to the company's proactive approach to security.

What it takes to be an interim CISO

What it takes to be an interim CISO

Being an interim or virtual CISO (vCISO) comes with many of the same demands of permanent security leadership roles, but also has its own unique challenges and rewards.

How holiday group Tui makes security awareness a company-wide effort

How holiday group Tui makes security awareness a company-wide effort

Enlisting security awareness advisors from each group in the organization is a force multiplier for driving better security behaviors.

Wargaming at Exeter helps keep the university battle ready

Wargaming at Exeter helps keep the university battle ready

Alan Hill of the University of Exeter says more universities need to understand who is targeting them and why to improve cybersecurity defenses and improve incidence response.

What CIOs want from CISOs: Collaboration and no finger pointing

What CIOs want from CISOs: Collaboration and no finger pointing

Two CIOs explain how they view their relationships with the security function, and why CISOs need to collaborate closely with CIOs whether they report into them or not.

What you need to know about the US CLOUD Act and the UK COPOA Act

What you need to know about the US CLOUD Act and the UK COPOA Act

A new data access agreement between the UK and US streamlines law enforcement’s ability to gain access to data held on foreign soil.

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

The new version China’s Multi-Level Protection Scheme (MLPS) expands what companies fall under its purview and lower the threshold for government inspection. Should companies with operations in China be concerned?

UK government gives £36 million to Arm to develop secure chips

UK government gives £36 million to Arm to develop secure chips

The government’s investment is a drop in the ocean for an issue that should be front and center for the semiconductor industry.

4 blockchain security lessons from Euroclear's CISO

4 blockchain security lessons from Euroclear's CISO

Euroclear is taking a security in-depth approach with its blockchain project. CISO Vincent Laurens shares his experience and offers advice for others looking to get started with blockchain.

How one information company amplifies its security team’s work and message

How one information company amplifies its security team’s work and message

Specialist information business Ascential extends its security team with champions who drive security culture across the global organization.

When and how to write a GDPR DPIA

When and how to write a GDPR DPIA

Data Protection Impact Assessments are a way for companies to minimize risk around new processes and keep a record demonstrating their efforts to comply with the GDPR.

Rebuilding after NotPetya: How Maersk moved forward

Rebuilding after NotPetya: How Maersk moved forward

In the wake of NotPetya attacks, Maersk’s IT and security teams embraced transparency, greater collaboration with business, and a risk-based approach.

3 DevSecOps success stories

3 DevSecOps success stories

Learn how three very different companies — Microsoft, Verizon and the Pokemon Company — got their development and security teams to work together smoothly.

Good bots vs. bad bots: How Electrocomponents tells the difference

Good bots vs. bad bots: How Electrocomponents tells the difference

Electrocomponents sells billions of pounds worth of products online, but malicious bots threaten that business. Here's how they keep bad bots at bay.

Load More