Articles


WHAT IF YOU CAN’T PATCH? 
By Scott Coleman, Director of Product Management – Owl Cyber Defense Solutions
September 2018


COGNITIVE BIASES IN INFORMATION SECURITY CAUSES, EXAMPLES AND MITIGATION
By Veselin Monev, information security and compliance practitioner
August 2018

HUMAN BEHAVIOUR AND DIGITAL TRUST: HOW UNEXPECTED REWARDS CAN IMPROVE CYBERSECURITY, PROTECT CRITICAL INFRASTRUCTURE AND REDUCE COSTS
By Chris A. Jones, George Runger and Jack Caravelli
August 2018


PSD2 – WILL IT BE A GOLD RUSH FOR CYBERCRIMINALS
By Pedro Fortuna, CTO at Jscrambler (www.jscrambler.com)
July 2018


MILIPOL QATAR – THE REGION’S LEADING INTERNATIONAL EVENT DEDICATED TO HOMELAND SECURITY AND CIVIL DEFENCE IN THE MIDDLE EAST
By Milipol Qatar communications team
July 2018


CYBER AND THE HEALTHCARE INDUSTRY
By UK Security Expo team
September 2017

TAMING INFORMATION OVERLOAD FOR EFFECTIVE BORDER CONTROLS
By Nate Carpenter from Securiport; Speaker at Interpol World 2017
June 2017

BACK TO THE FUTURE: CONTINUAL SECURITY FOR SMALL MEDIUM BUSINESS
By Miss Kiran Bhagotra, CEO & Founder, ProtectBox – www.protectbox.com
March 2017

A MARINE GROUP CIO’s ACCOUNT OF HIS JOURNEY AGAINST THE DIGITAL DARK SIDE
CYBER SECURITY: ARE WE BARKING UP THE WRONG TREE?
By Ken Soh, CIO of BH Global Corporation
March 2017

GUIDE TO DDoS MITIGATION AND TESTING
By Max Pritchard, pre-sales consultant, activereach
March 2017

WHO’S WATCHING YOU?
By Dominic Lyons, a Senior Technical Pre-Sales Network Architect at Tellemachus
November 2016

CYBER INSIDER RISK MITIGATION MATURITY MATRIX
By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL
November 2016

THE RAPID EVOLUTION OF THE RANSOMWARE INDUSTRY
By Patrick Vibert, Senior Consultant, Cyber Threat Intelligence, Control Risks
September 2016


INTERNATIONAL COLLABORATION
JAPAN AND ISRAEL’s CYBER COOPERATION FOR THE 2020 OLYMPIC GAMES
By Ori Bar-Chaim, Director General at Regional Branch of Custodio Pte. Ltd – a subsidiary of Israel Aerospace Industries (IAI) and Camila Edry, Department Manager of Cyber Centers at Cyber Directorate – Elta, IAI
July 2016


SMART CITIES: THE IMPLICATIONS FOR THE PRIVATE SECTOR
By Nicolas Reys, Consultant, Control Risks Cyber Security Services
July 2016


THE INSIDER SECURITY THREAT
HOW SHAREPOINT AND OFFICE 365 MEASURE UP
By Peter Bradley, CEO of Torsion Information Security
July 2016


APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT
By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army
February 2016


CRITICAL INFRASTRUCTURE AND OPERATIONAL TECHNOLOGY SECURITY
By Dr. Yiftah Lipkin (Israel Aerospace Industries Ltd), Amir Shlomo (Israel Aerospace Industries Ltd),
Amir Paz (Israel Aerospace Industries Ltd), David Menaker (Israel Aerospace Industries Ltd),
Guy Mizrahi, (Cyberia advanced cyber solutions [IAI’s Cyber accessibility center]), Niv David (Tel Aviv University)
November 2015


CYBERSECURITY WON’T EVOLVE IF WE’RE ONLY CLEANING UP AFTER A BREACH
By Ryan Olson, Intelligence Director at Palo Alto Networks
November 2015


A CONJOINT APPROACH: USER-CENTRIC AND DATA-CENTRIC SECURITY
By Dan Solomon, Director of Cyber Risk And Resilience Services, Optimal Risk Management and Arye Gickman, C.E.O, Longsight
November 2015


CONTROL-SYSTEM SECURITY ATTACK MODELS
By Andrew Ginter, VP Industrial Security, Waterfall Security Solutions
November 2015


CYBERSECURITY: A CALL FOR NATIONAL STRATEGY
By Yajan Dua, Aerospace & Defence Analyst, MarketsandMarkets
June 2015


THE CURRENT STATE OF CYBER WARFARE
By Lior Tabansky, Cyber Security Policy Expert, Tel Aviv University, the Yuval Ne’eman Workshop for Science, Technology and Security
May 2015


CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION
OPPORTUNITIES, SYNERGIES AND CHALLENGES
By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer at EUMS CIS Directorate.
May 2015


CYBER SECURITY ATTRIBUTES FOR CRITICAL INFRASTRUCTURE SYSTEMS
By Hugh Boyes CEng FIET CISSP, Cyber Security Lead, Institution of Engineering and Technology (IET).
May 2015


CYBER INSIDERS: A BOARD ISSUE
By Chris Hurran, OBE. Senior Associate Fellow of the Institute for Security and Resilience Studies at University College London.
May 2015


CYBER SECURITY FOR THE DEFENCE INDUSTRY
By Sanjana Sharma, Aerospace & Defense Analyst, MarketsandMarkets
May 2015


THE SURGE IN THE CYBER SECURITY MARKET
By Neha Gangwani and Apurva Chaudhari, Aerospace and Defense Analysts, Markets and Markets
May 2015


NEVER SURRENDER – A SOBER, YET OPTIMISTIC, VIEW OF THE FIGHT AGAINST CYBER THREATS
By Aaron (Ronnie) Eilat, General Manager, Custodio Pte Ltd, IAI’s cyber early warning R&D Center in Singapore
April 2015


MAKING SENSE OF THREAT INTELLIGENCE
UNDERSTANDING HOW TO LEVERAGE THREAT INTELLIGENCE WITHIN THE CYBER SECURITY ATTACK DETECTION AND RESPONSE PROCESS
By Piers Wilson, Head of Product Management, Tier-3 Huntsman
April 2015


SecuSUITE FOR BLACKBERRY 10 REDEFINES COMMUNICATION
By Dr. Hans-Christoph Quelle, CEO of Secusmart GmbH
April 2015


DATA PROTECTION AND PRIVACY 
LEARNING LESSONS FROM DATA BREACHES
By Piers Wilson, Head of Product, Management, Tier-3
April 2015


APPLYING MACHINE LEARNING TO ADVANCE CYBER SECURITY ANALYTICS
By Matt Wolff, Chief Data Scientist at Cylance
April 2015


THE END OF REACTIVE SECURITY, AND THE MOVE TO A DOCTRINE OF CYBER DEFENCE?
By Dan Solomon, Advanced Cyber Defence Services at Optimal Risk.
June 2014