Advertisement

A large 'X' marks a conceptual image of a password amid hexadecimal code.

How to review password quality in Active Directory

Regular reviews of the effectiveness of user, admin, and service passwords stored in Active Directory is a good idea. Here's how one password review tool works.


cio summit 2021 article thumb 1200

Virtual Event - 9.30am BST

Join the leading CIO community for unparalleled peer insight and expertise on business and IT strategy, innovation and leadership. Over 3 days, 50+ CIO Speakers will discuss where new technology investments are being made, talent and the new way of working as well as digital transformation while keeping systems resilient and agile.

cso 30 article 1

Submissions Now Open!

The CSO 30 aims to recognise 30 outstanding senior security professionals in the UK – from CSOs to CISOs, Heads of Security and equivalent – for demonstrating outstanding business value and thought leadership within their organisation.

Advertisement

cw multicloud forum article 1

Virtual Event - Now Available On Demand

At this half-day virtual event you will hear from experts and end users who are well on the path to cloud transformation, to help you set an effective multicloud strategy and create the flexible, dynamic architecture your business needs for sustained future success.

Binary flag of the European Union viewed through a magnifying lens and showing a ripple effect.

EU takes aim at ransomware with plans to make Bitcoin traceable, prohibit anonymity

The European Commission has set out new legislative proposals to make crypto transfers more traceable. While the plans will close some existing loopholes, the impact on cybercrime is likely to be minimal, experts say.


CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.


A gavel rests on open law book. [law / regulation / compliance / legal liability]

Security and privacy laws, regulations, and compliance: The complete guide

This handy directory provides summaries and links to the full text of each security or privacy law and regulation.


security threats and vulnerabilities

NCSC head champions UK-Israeli cyber relationship amid spyware accusations

NCSC CEO Lindy Cameron says cyber partnership with Israel is key to addressing global cyberthreats as accusations of mass spyware linked to a private Israeli company’s technology persist.


security trust

Secure multiparty computation explained: Ensuring trust in untrustworthy environments

Secure multiparty computation is a collection of algorithms that allow people to work together over a network to find a consensus or compute a value and have faith that the answer is correct. Everyone contributed fairly and there was...


Advertisement

Recruitment  >  Hiring compass pointing toward talent

UK Cyber Security Council gains charity status as cybersecurity talent development accelerates

Charity Commission grants UK Cyber Security Council charitable status in recognition of its ongoing role in developing education, training and skills in the UK cybersecurity sector.


A vault door security mechanism with abstract circuits. / increase security / harden against attacks

Best Mitre D3FEND advice to harden Windows networks

Mitre's recently released D3FEND matrix offers sound guidance for any security admin or CISO looking to harden a Windows network against attack.


A binary map of china.

Biden administration, US allies condemn China's malicious hacking, espionage actions

Global coalition calls on China to curtail its cyber activities. For the first time, the US blames China directly for ransomware attacks.


A lost businessman wanders amid conflicting directional signs through the fog.

8 biases that will kill your security program

CISOs and their security teams often hold cognitive biases that get in the way of making the right risk management and incident response decisions. Here are eight of the most common to avoid.


google cloud ciso phil venables on the future of cloud security

Google Cloud CISO Phil Venables on the future of cloud security

Can cloud providers help lift security's burden of endless compliance checklists and certifications?