Dan Swinhoe

Editor

Dan Swinhoe is UK Editor of CSO Online. Previously he was Senior Staff Writer at IDG Connect.

Solar power shines light on security for the renewable energy industry

Solar power shines light on security for the renewable energy industry

Solar power plants have massive numbers of vulnerable internet-connected devices. It's recent focus on cybersecurity is awakening the rest of the renewable energy industry to the threat.

Brexit data protection decision uncertainty threatens UK-EU data flows

Brexit data protection decision uncertainty threatens UK-EU data flows

A no-deal Brexit scenario seems likely, and CISOs will need to adapt policies and procedures if the EU does not declare data protection adequacy for the UK.

Why wealth management firms are investing in their own cybersecurity

Why wealth management firms are investing in their own cybersecurity

Holding personal data on high net-worth individuals and conducting large financial transactions make wealth management an attack target, and management is starting to take it seriously.

Brute-force attacks explained, and why they are on the rise

Brute-force attacks explained, and why they are on the rise

The surge in remote work has rekindled interest in brute-force attacks, but a few simple steps can make your organization less of a target for them.

How to report cybercrime in the UK

How to report cybercrime in the UK

UK businesses are encouraged to contact Action Fraud if they are a victim of cybercrime, but they might also need to inform local authorities or regulators.

Protecting employee COVID-19 health data: What CISOs need to know

Protecting employee COVID-19 health data: What CISOs need to know

Most companies are tracking coronavirus-related health data of their employees, and this presents unique risks and security challenges for CISOs.

What's next? CISOs weigh in on COVID’s long-term effects on security

What's next? CISOs weigh in on COVID’s long-term effects on security

CISOs are looking ahead to see how their security organizations need to work post-COVID. Here's what they expect.

How NHS Digital is meeting COVID-19 cybersecurity challenges

How NHS Digital is meeting COVID-19 cybersecurity challenges

Earlier response to the WannaCry crisis has helped create an infrastructure where UK healthcare organizations get better security support and threat intelligence

Managing vendor and supply chain risk in a recession

Managing vendor and supply chain risk in a recession

The COVID-19 crisis is putting security vendors, especially startups, under severe pressure. Here's how to vet their financial stability and prepare for the worst.

Cybercrime in a recession: 10 things every CISO needs to know

Cybercrime in a recession: 10 things every CISO needs to know

Economic downturns force cybercriminals to change focus and creates conditions for new criminals to join their ranks. Here's how to prepare.

8 ways attackers are exploiting the COVID-19 crisis

8 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

UK ICO issues COVID-19 guidance for data protection regulation enforcement

UK ICO issues COVID-19 guidance for data protection regulation enforcement

UK’s data protection regulator promises to be flexible to affected organizations but firm on those using it as an excuse not to follow compliance requirements.

UK cybersecurity statistics you need to know

UK cybersecurity statistics you need to know

Use these key data points to help understand and communicate the risks UK businesses face.

How much does it cost to launch a cyberattack?

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low.

Pharming explained: How attackers use fake websites to steal data

Pharming explained: How attackers use fake websites to steal data

A pharming attack aims to redirect victims’ web traffic away from their intended destination to a website controlled by threat actors to harvest information and spread malware.

Cybersecurity apprenticeships help UK companies fill the skills gap

Cybersecurity apprenticeships help UK companies fill the skills gap

Organisations large and small can find untapped, undeveloped cybersecurity talent through apprenticeship programs. Here's how some succeeded.

How Prudential measures its security culture to identify risk

How Prudential measures its security culture to identify risk

The financial services firm finds that employee confidence in how they would respond to a given security scenario is a better indicator of risk than their security knowledge.

How CISOs can best assess geopolitical risk factors

How CISOs can best assess geopolitical risk factors

A recent report on Russian-affiliated advanced persistent threats provides a template to help CISOs evaluate risk from nation-state actors.

How one healthcare CISO is navigating the COVID-19 crisis

How one healthcare CISO is navigating the COVID-19 crisis

Security is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.

Supreme Court rules Morrisons not liable for data breach caused by rogue insider

Supreme Court rules Morrisons not liable for data breach caused by rogue insider

Courts rule in Morrisons favour after a disgruntled insider leaked information, setting a precedent around insider threats and data breaches but also leaving questions unanswered.

Load More