Many players within the cybersecurity consulting industry have conditioned boards to think about cyber risk through the wrong ...
We need to do more than deflect cyberattacks: we need to build the capacity to sustain business operations during and after a cyberattack. At the TED Conference in Vancouver this year, our Radical ...
Cyber-risk in South Africa is not an if anymore, it’s when the attackers get in and how equipped the company is to deal with it, writes Mohammed Pochee, product manager: security at Vox. A company can ...
Forbes contributors publish independent expert analyses and insights. Tony Bradley covers the intersection of tech and entertainment. Passwords remain the primary method of authentication and password ...
Large organisations that provide IT services, including datacentres, will face regulation to ensure they have adequate cyber security and resilience plans, under laws being introduced in Parliament ...
On Tuesday 3 February, techUK’s Head of Cyber Resilience, Jill Broom gave oral evidence to the House of Commons Cyber Security and Resilience Bill Committee.
This session explored how cyber SMEs can enter and scale within the UK’s fastest-growing sectors, focusing on commercial ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results