-
Is biometric authentication truly a superior form of security? In this article we will explore this question, touching on what it actually is, its benefits, the challenges it faces, and what it could ...
-
How the baddies in Hollywood movies might have succeeded in their dastardly plots, had their information security policies been better.
-
This article explores how trust, literal communication, and system gaps can make neurodivergent people easier targets - and why we need to make cybersecurity inclusive by design.
-
External Attack Surface Management (EASM) and penetration testing are essential in cybersecurity, offering continuous monitoring and in-depth analysis of vulnerabilities. Together, they provide a proa ...
-
SMEs face critical challenges in implementing effective information security policies. As cyber threats evolve and attackers become more sophisticated, SMEs often struggle to protect their businesses, ...
-
Until last year, my connection to computer science was a distant memory. The days of coding in Pascal (by choice, no less, in an after-school club) were long behind me, as were my computer-building sk ...
-
Navigating the challenges of managing an information security department whilst also facing personal health battles has been demanding to say the least. One of the most significant lessons I have lear ...
-
This blog will explore why security professionals need to embrace delivery and how doing so enhances both their impact and the overall security posture of the organization.
-
As an author addressing the challenges of DORA compliance and the rising importance of cyber resilience, I've observed firsthand the transformative impact these regulations are having on the financial ...