Tony Morbin

Simply the best  - SC Awards Europe finalists announced

Simply the best - SC Awards Europe finalists announced

Have you made it onto the shortlist as a finalist for the SC Awards Europe - the industry’s premier Awards? Check below now.

Cloud/Cyber Expo 2020: Navigating the staffing challenge with security teams

Cloud/Cyber Expo 2020: Navigating the staffing challenge with security teams

Find out what excites & will retain staff; be flexible in hiring eg teams working remotely in other parts of the country. It's not just about pay and benefits, but 'is it the right place to be, to grow and develop?'

International Women's Day. Overcoming barriers - a marathon with hurdles

International Women's Day. Overcoming barriers - a marathon with hurdles

Closing the gender gap in cyber-security could boost the UK economy by £12.6 billion - so why is it not happening? And how do women overcome these barriers and succeed in cyber-security?

Defence Secretary calls for more 'cyber', close international cooperation to reduce conflict

Defence Secretary calls for more 'cyber', close international cooperation to reduce conflict

"We need more cyber to protect us in cyberspace, more sigint, more electronic warfare and special operations capabilities ...will mean we should work even more strongly with the US" Defence Secretary

Hacking is cool - but is ethical always legal? Hackers discuss hiring hackers

Hacking is cool - but is ethical always legal? Hackers discuss hiring hackers

“Clients want someone as trustworthy as approved staff, acting diligently, not causing an outage or leak. But they want to simulate a real attacker, who acts with impunity & runs wild. It's difficult to reconcile.” Laurie Love

Strategic cyber-leaders of the future rise to the challenge

Strategic cyber-leaders of the future rise to the challenge

Increasingly tech needs to be coupled with an ability to see the big picture, strategise and articulate problems and potential solutions to policy makers - which is where the Cyber 9/12 Challenge comes in.

Time for security to take control of machine identity from engineering

Time for security to take control of machine identity from engineering

We audit to understand AI decision-making, but not for the risk of subversion; security comes in last. 2019 saw a big increase in commodity malware abusing SSH machine identities in various ways.

How to eliminate ransomware:  No one pay, ever. And get compensation

How to eliminate ransomware: No one pay, ever. And get compensation

In 2020 “A local government somewhere will ban public-sector ransomware payments,” suggested Markus Braendle, CEO, Airbus CyberSecurity. Now extrapolate that thought.

UPDATE: Bezos' phone hack: NSO denies any involvement

UPDATE: Bezos' phone hack: NSO denies any involvement

NSO denies involvement in case of Jeff Bezos, alleged to have had his phone hacked via a video file from the WhatsApp account of Saudi Arabia's crown prince, Mohammed bin Salman.

Book Review: What did you do in the cyber-war?

Book Review: What did you do in the cyber-war?

A children's book that explains the concepts of cyber-security with kings, castles and gold rather than enterpriseses, networks and data.