Michael Hill

UK Editor

Michael Hill is the UK editor of CSO Online. He has spent the past five-plus years covering various aspects of the cybersecurity industry, with particular interest in the ever-evolving role of the human-related elements of information security. A keen storyteller with a passion for the publishing process, he enjoys working creatively to produce media that has the biggest possible impact on the audience.

The Kaseya ransomware attack: A timeline

Biden sanctions Suex cryptocurrency exchange to stifle ransomware payments

Biden sanctions Suex cryptocurrency exchange to stifle ransomware payments

In the wake of significant ransomware attacks, President Biden has sanctioned cryptocurrency exchange Suex in a clear attempt to prevent ransomware payments.

HP CISO Joanna Burkey: Securing remote workers requires a collaborative approach

HP CISO Joanna Burkey: Securing remote workers requires a collaborative approach

New research finds 91% of IT teams feel pressure to compromise cybersecurity for WFH business continuity. HP CISO Joanna Burkey urges security leaders to tackle workforce IT conflicts to secure the remote and hybrid workplace.

How CISOs and CIOs should share cybersecurity ownership

How CISOs and CIOs should share cybersecurity ownership

CISOs and CIOs weigh in on how their cybersecurity responsibilities are evolving with changes in the business environment and threat landscape.

9 notable government cybersecurity initiatives of 2021

9 notable government cybersecurity initiatives of 2021

Governments are increasingly taking on cybersecurity threats, as these nine government-led initiatives from around the globe show.

The T-Mobile data breach: A timeline
Updated

The T-Mobile data breach: A timeline

Telecommunications giant T-Mobile warns data belonging to almost 50 million individuals has been exposed. Here is a timeline of the data breach and its ramifications.

CyberScotland releases Incident Response Guide to prepare businesses for cyberattacks

CyberScotland releases Incident Response Guide to prepare businesses for cyberattacks

New guide seeks to ensure small and medium businesses are equipped to deal with cyber incidents as industry experts welcome clear, concise advice.

4 most dangerous emerging ransomware threat groups to watch

4 most dangerous emerging ransomware threat groups to watch

New research identifies four emerging ransomware groups currently affecting organizations and that show signs of becoming bigger threats in the future.

What CISOs need to know about Wi-Fi 6E

What CISOs need to know about Wi-Fi 6E

Wi-Fi 6E is the most secure wireless standard ever, but making the wrong implementation decisions or not understanding its risks will negate that advantage.

Reporting data breaches under GDPR: A guide for UK businesses

Reporting data breaches under GDPR: A guide for UK businesses

Here's how UK organisations should report data breaches in adherence with strict GDPR data protection guidelines.

Amazon Sidewalk highlights network security visibility risks consumer services pose

Amazon Sidewalk highlights network security visibility risks consumer services pose

Research warns consumer-grade services can undermine risk assessment of corporate networks amid remote working as Houdini malware spoofs devices to exfiltrate data.

How Jefferson Health enhanced cybersecurity via its cloud transformation

How Jefferson Health enhanced cybersecurity via its cloud transformation

Jefferson Health CISO Mark Odom discusses the healthcare provider's shift to a cloud-first strategy and shares how it has created a more efficient, agile, and risk-focused security approach.

Load More