Skip to main content

UK Cyber Week Blog

Sample Image

Loading
  • Is biometric authentication truly a superior form of security? In this article we will explore this question, touching on what it actually is, its benefits, the challenges it faces, and what it could ...
  • The Hollywood approach to security analogies

    11 Nov 2024 Matt Gordon-Smith
    How the baddies in Hollywood movies might have succeeded in their dastardly plots, had their information security policies been better.
  • This article explores how trust, literal communication, and system gaps can make neurodivergent people easier targets - and why we need to make cybersecurity inclusive by design.
  • External Attack Surface Management (EASM) and penetration testing are essential in cybersecurity, offering continuous monitoring and in-depth analysis of vulnerabilities. Together, they provide a proa ...
  • SMEs face critical challenges in implementing effective information security policies. As cyber threats evolve and attackers become more sophisticated, SMEs often struggle to protect their businesses, ...
  • Until last year, my connection to computer science was a distant memory. The days of coding in Pascal (by choice, no less, in an after-school club) were long behind me, as were my computer-building sk ...
  • Navigating the challenges of managing an information security department whilst also facing personal health battles has been demanding to say the least. One of the most significant lessons I have lear ...
  • This blog will explore why security professionals need to embrace delivery and how doing so enhances both their impact and the overall security posture of the organization.
  • As an author addressing the challenges of DORA compliance and the rising importance of cyber resilience, I've observed firsthand the transformative impact these regulations are having on the financial ...