Michael Hill

UK Editor

Michael Hill is the UK editor of CSO Online. He has spent the past five-plus years covering various aspects of the cybersecurity industry, with particular interest in the ever-evolving role of the human-related elements of information security. A keen storyteller with a passion for the publishing process, he enjoys working creatively to produce media that has the biggest possible impact on the audience.

The Kaseya ransomware attack: A timeline

5 riskiest mobile apps

5 riskiest mobile apps

Unsanctioned applications on corporate mobile devices is a security headache. Here are the five types of apps CISOs never want to find on corporate mobile devices, with strategies for mitigating the risks they pose.

EU takes aim at ransomware with plans to make Bitcoin traceable, prohibit anonymity

EU takes aim at ransomware with plans to make Bitcoin traceable, prohibit anonymity

The European Commission has set out new legislative proposals to make crypto transfers more traceable. While the plans will close some existing loopholes, the impact on cybercrime is likely to be minimal, experts say.

NCSC head champions UK-Israeli cyber relationship amid spyware accusations

NCSC head champions UK-Israeli cyber relationship amid spyware accusations

NCSC CEO Lindy Cameron says cyber partnership with Israel is key to addressing global cyberthreats as accusations of mass spyware linked to a private Israeli company’s technology persist.

UK Cyber Security Council gains charity status as cybersecurity talent development accelerates

UK Cyber Security Council gains charity status as cybersecurity talent development accelerates

Charity Commission grants UK Cyber Security Council charitable status in recognition of its ongoing role in developing education, training and skills in the UK cybersecurity sector.

The 15 biggest data breaches of the 21st century

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

Business email compromise (BEC) attacks take phishing to the next level

Business email compromise (BEC) attacks take phishing to the next level

Business email compromise (BEC) is a highly targeted, email-based attack that tricks victims into exposing company information, handing over money, or getting them to perform other acts that negatively impact the business.

INTERPOL: International police coordination required to combat global cyberthreats

INTERPOL: International police coordination required to combat global cyberthreats

Senior police officials from 167 countries endorse INTERPOL proposals to enhance transnational police cooperation to combat global cyber-related crime and corruption.

NCSC: Impact on UK orgs from Kaseya ransomware attack ‘limited’

NCSC: Impact on UK orgs from Kaseya ransomware attack ‘limited’

The REvil ransomware attack on Kaseya’s VSA product is estimated to have affected over 1,000 companies globally, but the impact on UK organisations currently appears limited.

Rainbow tables explained: How they work and why they're (mostly) obsolete

Rainbow tables explained: How they work and why they're (mostly) obsolete

Rainbow tables are password cracking tools with origins dating back to research from the early 1980s. Here's how they work, why attacks are easy to prevent, and how they compare to modern password cracking.

HSBC CISO champions neurodiversity awareness in cybersecurity

HSBC CISO champions neurodiversity awareness in cybersecurity

HSBC’s CISO for Asia Pacific Jonathan Scott-Lee discusses his aims as the organization’s ambassador for neurodiversity, the importance of neurodiversity in cybersecurity and cultivating a more neurodiverse technology sector.

UK Cyber Security Council launches initiatives to develop cybersecurity talent

UK Cyber Security Council launches initiatives to develop cybersecurity talent

Cybersecurity standards, ethics, qualifications, and careers all in focus ahead of UK Cyber Security Council’s membership launch in September.

Load More