See me speak at Cyber Security Nordic – either in Helsinki or online
In my keynote I'll be discussing whether cybercriminals really are evil geniuses (as the media and some security vendors would like us to believe), or...
South Korea Admitted to NATO Cyber Defense Center
Country becomes first Asian nation to join the group Read More
9 top identity and access management tools
Identity and access management (IAM) has long been a key proving ground of security leaders’ careers, with many a make-or-break decision made over identity technology...
NHS Inboxes Hijacked to Send 1000+ Malicious Emails
Phishing campaign relied on individually compromised users Read More
FBI: Thailand and Hong Kong Banks Used Most in BEC
Email compromise could be a $43bn problem Read More
Smashing Security podcast #273: Password blips, and who’s calling the airport?
We find out why calls to Dublin airport's noise complaints line have soared, and Carole quizzes Graham to celebrate World Password Day. All this and...
BrandPost: CWPP: How to Secure Cloud-Native Applications Built with Containers
The transition into CWPP Agility and flexibility were key directives in the development of new technology, which is why on-premise assets soon transitioned into virtual...
BrandPost: Protecting Cloud Assets in 5 Steps with Micro-Segmentation
Whether a company utilizes a private, hybrid or public cloud infrastructure or offers cloud services to others, it is critical that each cloud instance and...
BrandPost: SD-WAN and Cybersecurity: Two Sides of the Same Coin
Software-defined wide area networking, or SD-WAN, is the next frontier for the network edge. Multiple analysts report that the SD-WAN market is in the billions...
BrandPost: ZTNA: The New Way to Secure Remote Workers and the Cloud
Digital transformation, or DX, is driving enterprises worldwide to adapt their network and security strategies. Two key trends in particular have accelerated due to the...
