
Hacktivism’s changing faces
Online hacktivism is not new: it has been around almost as long as the public internet. But the make up, and goals, of hacktivist groups has changed over the years. Today’s hactivist is less likely […]
Online hacktivism is not new: it has been around almost as long as the public internet. But the make up, and goals, of hacktivist groups has changed over the years. Today’s hactivist is less likely […]
Stress and workplace burnouts are growing problems in the cybersecurity industry. A degree of stress perhaps goes with the territory: cybersecurity is, after all, a fast-paced industry. And responding to a cyber attack is always […]
In the online world, do we really know who we are speaking to? The rise of deepfakes is challenging our assumptions about identity, and even how to tell if we are dealing with another human. […]
The average mid-sized company now uses over 200 Software as a Service, or SaaS, applications. And worldwide there are some 30,000 SaaS applications to choose from, from general office productivity to industry niches. And the […]
In this episode, we dive into the world of cyber escape rooms, and “experiential learning”. Will we find out way out? It’s long been a challenge for CISOs to deliver security training, and build security […]
As many as 90 per cent of security breaches involve human error or social engineering. So how do we reduce the risks from human behaviour? In this, the second of our short series exploring the […]
People pose the greatest risk to cybersecurity. Most cybersecurity breaches either start with, or exploit, human error. People make mistakes. They fall victim to social engineering. Or they fail to set up their systems and […]
In just a few short years, artificial intelligence has moved from an academic computer science discipline to the most talked about topic in technology. And, though some aspects of AI are surely overhyped – AI […]
Everyone in cybersecurity knows ransomware is a problem. What’s less clear, is how we can defend against it. Despite the coverage ransomware generates, it’s hard to put an exact figure on ransomware attacks. All the […]
Constant change and the need to adapt is always a feature of cybersecurity. It is certainly a feature of the day to day role of the CISO. And that’s why our guest this week lists […]
Copyright © 2025 | MH Magazine WordPress Theme by MH Themes