Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Episode 5: Budgeting for Security: Financial Planning for Cyber Compliance

Our bonus episode tackles the vital topic of budgetary planning for cybersecurity compliance within educational institutions. We'll shed light on effective strategies for early communication of cybersecurity requirements within the school, engaging key stakeholders such as bursars, finance teams, and administrators.

Episode 4: Risk and Resilience: The Role of Cyber Insurance in Education

Gain insight into the crucial function of cyber insurance for educational institutions. We will explore the pivotal intersection of cyber insurance, regulatory compliance, and cutting-edge solutions in the context of safeguarding educational institutions. Speakers:· Wendy Pattison, CFO and Business Director, Framwellgate School· DI Martin Wilson, Detective Inspector, North East Business Resilience Centre (NEBRC)· Joe Cockcroft, Service and Technology Supervisor, North East Business Resilience Centre (NEBRC)· Edward Renwick, Strategic Partner Executive at Acronis.

Episode 3: Defensive Tactics: Meeting DfE and NCSC Cybersecurity Standards

This session equips education professionals with strategies and tools to traverse the complexities of cybersecurity. The narrative melds a real incident with the stringent guidelines from the Department for Education and the National Cyber Security Centre. Speakers: Timestamps: Additional Resources.

Episode 2: How Cyber Criminals were Foiled after Stealing School Data and Demanding Payment

Discover in 30 minutes how public and private sector organisations combined to help a school recover, post-cyberattack. Using a timeline of events, law enforcement officers involved in the incident will discuss decision-making during the event, together with first-hand testimony from the affected school and Acronis, a prominent cyber resilience solution provider, and key partner of the NEBRC. Speakers.

Episode 1: Cyber Risk Overview: Navigating Threats in Education

Our opening 30-minute episode dissects the current cyberthreat landscape, illuminating the cyberthreats facing the EMEA region and the highly targeted education sector in particular. Engage with us as we decode the cybersecurity hurdles faced by schools and higher education institutions. Speakers: Chapters: Additional Resources.

API Security for SaaS Product Development: Protecting Multi-Tenant Platforms and Customer Trust

APIs are now the foundation of SaaS product development, powering authentication, user onboarding, billing, integrations, webhooks, analytics, and internal microservices. As this API footprint grows, the threat landscape has intensified. The Indusface State of Application Security H1 2025 Report recorded a 104% rise in API-targeted attacks, a 13X increase in API vulnerability exploits, and 388% more DDoS attacks on API hosts than on websites.

How to Automate API Security Testing During CI/CD

During the first half of 2025, APIs faced significantly higher number of attacks than traditional web applications. On average, attacks per API host were 72% higher than those targeting websites, and exploitation of API vulnerabilities surged 13× compared to a 27% increase for website vulnerabilities, according to the State of Application Security Global H1 2025.

Why Automotive Manufacturers Are Switching to OEM Owned Key Management System

The automotive industry is undergoing a profound transformation. With vehicles now functioning as software-defined, connected platforms, manufacturers face unprecedented security challenges. From over-the-air (OTA) updates and telematics to ADAS, battery systems and mobility services, every vehicle today relies on digital identities and cryptographic trust. Historically, OEMs have relied heavily on Tier 1 suppliers to manage keys, certificates and firmware signing processes.

Don't Let AI Put Your Jira Data at Risk

Artificial Intelligence is everywhere nowadays. It helps teams to be more productive, but at the same time, it can threaten your critical project management data. The introduction of AI into Jira opened up new paths for attackers to exploit, new vulnerabilities coming up internally, and human errors. So, in this article, let’s speak about AI data loss in Jira and what measures to take to protect your sensitive data in Jira Cloud.

How to measure the ROI of penetration testing and cyber security investments

Cyber security is a critical business enabler. Proactive cyber security measures, such as penetration testing, threat monitoring, and staff training, reduce the likelihood of breaches and operational disruption. However, demonstrating the return on investment (ROI) of these initiatives can be difficult to quantify.