Advertisement

amd article 1200x8002

Virtual Event

While the public cloud offers great advantages of speed and agility, it still needs to coexist with on-premise investments and legacy systems. Long story short: the hybrid world is here to stay. Join this Big Conversation, with our partners at AMD, to discuss bridging these two worlds effectively.

Advertisement

servicenow rt article v1

3.30pm BST - Virtual Event

In this roundtable, we investigate: • What is the future of the workplace • The culture, technological and process changes required to adapt to the future workplace • How to take your people with you • Aligning the future workplace with ever-changing business goals. Including protecting revenue and reducing costs, pursuing productivity and prioritising business continuity and resilience. • The benefits of a cloud-based, platform approach to achieving employee flexibility and business agility • Why work with ServiceNow

cohesity rt article v1

1:00pm BST - Virtual Event

At this CIO Digital Roundtable, along with our partners Cohesity, you will have the opportunity to discuss the challenges you have faced in pivoting your organisation to being more data-driven and share success stories around operationalising your mountains of enterprise data.

cio 100 the conference image

Virtual Event

The CIO 100 recognises the most transformational and disruptive CIOs and technology leaders in the UK. Hear from esteemed technology leaders and peers through a variety of panels and keynote presentations as they discuss leading transformation across a diverse range of markets and the initiatives to be implementing for 2021.

Encryption  >  Encrypted data / hexadecimal code

4 hot areas for encryption innovation

Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic research.


Impersonation / disguise / fraud / false identity / identity theft

Identity theft explained: Why businesses make tempting targets

Identity theft is the use of someone else's personal information without permission, typically to conduct financial transactions. Here's what you need to know to protect yourself and your organization.


Insider threats  >  Employees suspiciously peering over cubicle walls

Preventing insider threats: What to watch (and watch out) for

Understanding human behaviors that precede malicious actions from an insider is the best way to avoid data loss or disruption, experts say.


2020 01 13

The inaugural CSO30 is a celebration of the role of the CSO and recognises the leading security executives in the UK.

Advertisement

Meredith Harper, Eli Lilly and Company

Eli Lilly security finds strength in flexibility in WFH shift

CISO Meredith Harper shares the greatest challenges her organization faced in the wide-scale move to work-from-home and lessons learned that will outlast the pandemic.


CSO  >  Searching for vulnerabilities  >  Magnifying lens in a virtual interface idnetifies weakness

Zerologon explained: Why you should patch this critical Windows Server flaw now

Attackers have learned how to exploit the Zerologon vulnerability in Windows Server, potentially gaining domain admin control.


Goher Mohammad, CISO / head of infosec at charitable housing association L&Q Group.

Shaking off old public sector security perceptions at L&Q Group

CISO Goher Mohammad discusses how the public sector's approach to security is changing and what the private sector can learn from it.


Phishing attack   >   A fish hook hover above binary code with a caution triangle.

9 top anti-phishing tools and services

Some of these solutions will help find and stop phishing emails before they can cause damage, while others will find phishers fraudulently using your business's brand.


locked data / bitcoins

WastedLocker explained: How this targeted ransomware extorts millions from victims

WastedLocker is sophisticated ransomware created by Evil Corp, a notorious cyber criminal group.