People News, Articles and Updates

New Categories announced. Entries invited NOW for SC Awards Europe 2018!

Check out the New Categories and get going on your entry now to be in with a chance of winning at the cyber-security industry's most prestigious Awards - then book your ticket for the gala Awards night presentations.

The security risks of ghost users: 1 in 4 accounts are inactive

Some 26 percent of all accounts surveyed were of 'stale enabled users'; accounts - and 90 percent in one case.The risk is two-fold: ex-employee with unauthorised access, and the account can be hijacked by an external hacker.

How women can play a bigger part in cyber-security - to everyone's benefit

Book Review: In Security. Jane Frankland shares her experience of being female in what is still a male-dominated sector, while advising other women and the businesses that employ them how to harness their talent and skills.

Equifax board picks former Broadcom exec for tech committee

Two months after revelations that an Equifax breach had exposed information on 145.5 million US consumers, the company has added Scott A McGregor, former CEO of Broadcom Corp. to the board and to its technology committee.

The cause of recent cyber-attacks: complacency.

When it comes to cyber-security, the problem is that while businesses and IT leaders are prioritising cyber-security investment, the investment in that security has always been responsive, rather than preventative says Steve Inglessis.

How your business can survive the cyber-security skills crisis

More than two thirds of companies struggle to recruit the staff necessary to defend themselves; the Center for Cyber Safety and Education suggests a workforce gap of 1.8 million by 2022. What can be done asks Jay Coley.

Email security: a technological problem with a technological solution

Email fraud can only be solved using technology to improve what is, and always has been, an inherently unsafe communication method says Nick Yarham. Remove threats & halt fraudulent attempts before they reach the end user.

Closing the skills gap to secure the future - invest in people

Doug Wylie says organisations must invest in security skills now, to secure their systems for their future, noting companies have invested in tech for a workforce not trained how to securely operate and maintain these systems.

Equifax CEO departs, following CSO & CIO; breaches truly a board issue

Equifax CEO Richard Smith has abruptly retired following a massive breach that exposed the data of 143 million US consumers and thousands in Canada and the UK, and cast the company's security practices into question.

Are SOCs failing? People-centric security is key in attack detection

In order for an organisation to see a clear return on its SOC investment - an investment that can currently see millions spent and effectively nothing gained - it needs to ask where its efforts are best focused says Luke Jennings

Tier one incident expected, Government cyber-specs likely - NCSC

We can expect to see a cyber-security incident at a category one level within the next few years. The government specifying what it will buy is an effective way of changing the market - Ian Levy, technical director, NCSC

InfoSec 2017: "If security doesn't work for people, it doesn't work"

People are now officially the strongest link in cyber-security and this people-centric approach demands that vendors make their tech easier to use, and organisations implement policies that people will choose to follow.

MI5 deputy director general Jeremy Fleming appointed director of GCHQ

Jeremy Fleming, deputy director general of MI5, has been appointed to succeed Robert Hannigan as director GCHQ today.

Are there any facts about Post-truth?

Fake news, selective leaking of hacked data, lies and deception - the new attacks are just deception updated. If we choose to only believe our bias, and ignore difficult facts, then we are helping those who would deceive us.

InfoSec 2016: Get staff onside to build a security culture

Its not security awareness, but changing behaviour that's the problem, and it takes time and effort to get it right delegates were told at InfoSec 2016.