A CISO’s journey: Mani Nagothu
Constant change and the need to adapt is always a feature of cybersecurity. It is certainly a feature of the day to day role of the CISO. And that’s why our guest this week lists […]
Constant change and the need to adapt is always a feature of cybersecurity. It is certainly a feature of the day to day role of the CISO. And that’s why our guest this week lists […]
Should cybersecurity leaders look beyond their own organisations, to fill the skills gap? Cybersecurity’s skills shortage is a persistent problem, despite the best efforts of recruiters, governments, the education sector and professional bodies. Worldwide, there […]
Ransomware now accounts for as much as 90% of cyber attacks. And over the last 10 years, ransomware has grown steadily in volume, but also as a threat. Ransomware is not just about encrypting data; […]
The cloud is now a secure way to secure data and run applications. Or it should be. Cloud service providers, especially the “hyperscalers”, now have robust security in place. And their security measures are typically […]
Passwords have been around for millennia. But are they still fit for purpose? If not, what should replace them? Passwords were once simply a way to prove identity: something you know, to prove who you […]
Critical national infrastructure is constantly under attack, from an ever greater range of threat actors. Not all the attacks are reported, of course, and governments and businesses go to great lengths to protect their systems, […]
It’s now under a year until the EU’s Digital Operational Resilience Act – or DORA – will come into force. DORA is a regulation for the bloc’s financial services sector. And, as the name suggests, […]
The UK Government is proposing a new cybersecurity governance code of practice for businesses. The Department for Science, Innovation and Technology (DSIT), along with the NCSC and industry partners, has drawn up an initial draft. […]
Web applications are now at the heart of systems across both the private and public sectors. And a plethora of systems now work via web interfaces and API calls. Some estimates suggest any one enterprise […]
2024 is set to bring its challenges for everyone in cybersecurity. From growing threats and an increasing attack surface, as the world becomes ever more digital, to more onerous regulatory requirements and the risks posed […]
Copyright © 2025 | MH Magazine WordPress Theme by MH Themes