Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Is the RSA Algorithm and How Does It Work?

In today’s digital landscape, cryptography plays a vital role in keeping information secure. Encryption is one of the primary techniques used in cryptography to ensure that data transmission online is secure and that sensitive information stays protected from unauthorized access. Through encryption, organizations and individuals can mitigate the risk of data breaches and ensure that their confidential information remains that way.

How to Set Up a Security Operations Centre In 5 Steps

The benefits of a security operations centre (SOC) are most obvious when you don't have one. For example, imagine it’s 3 am on a Saturday morning and a hacker breaks into your organisation's systems. There’s no one to detect the intrusion and no one to deal with it either. In fact, it’s not until a member of your sales team notices they are locked out of the network on Monday morning that anyone even knows there is something wrong. After that, things start happening very fast.

Beyond the basics: Leveling up security awareness training for modern threats

Security awareness training (SAT) holds a crucial role in protecting businesses from modern threats. A well-designed SAT program not only educates employees but also helps foster a genuine security-conscious culture within the organization. In this blog, we explore how organizations can level up their basic SAT initiatives and highlight the oversight of compliance-driven training in fostering a genuine security-conscious culture.

Crafting An Effective Insider Threat Incident Response Plan

Organizations face many threats today, but not all potential threats are from malicious activities outside the organization. Insider threats are just as significant, if not more significant, of a security risk to companies today. Since 2018, there has been a 40% increase in data breaches caused by company insiders, so they now represent most of them.

UK Creates New Laws to Safeguard Consumers Against Cyber Threats Posed by Smart Devices

As 99% of UK adults now own at least one smart device, and the average UK household enjoys the benefits of nine connected devices, the timing of new laws designed to protect consumers from hacking and cyber-attacks while using internet-connected smart devices couldn't be more timely.

Introducing enterprise-ready capabilities to help you manage compliance at scale

Today we’re excited to announce new and enhanced enterprise-grade platform capabilities that build upon our existing enterprise capabilities and customization functionality. Along with our new AI-powered Trust Center announced today, these capabilities enable mature organizations to run their security and compliance programs and demonstrate trust at scale.

EP 51 - Balancing Innovation and Security in FinTech

In this episode of Trust Issues, host David Puner interviews Eric Hussey, SVP, Chief Information Security Officer (CISO) at Finastra, a leading provider of financial software solutions and services. Hussey shares his insights on the evolving role of the CISO, the challenges of keeping up with new and evolving cybersecurity regulations, and the importance of balancing innovation with security in the FinTech space.

Freeing the UK Public Sector from Legacy IT debt

As the UK cybersecurity sector prepares to meet at CyberUK next month, I have been reflecting on the conference’s theme–Securing an open and resilient digital future–and what might be the barriers to such a vision. One of the biggest challenges is doubtless the hefty legacy IT in the UK’s public sector.