THE PEOPLE BEHIND THE PIXELS: WHY CYBERSECURITY IN CRITICAL INDUSTRIES IS MORE HUMAN THAN EVER
Cyber Security Review online – July 2025
HOW TO MAXIMIZE EXCHANGE SERVER UPTIME? – SOME BEST PRACTICES
Cyber Security Review online – June 2025
KEY METRICS TO TRACK WHEN IMPLEMENTING AI IN YOUR SOC
By Josh Breaker-Rolfe
December 2024
ACHIEVING DATA SECURITY RESILIENCE WITH DSPM TOOLS
By Katrina Thompson
November 2024
HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING
This article outlines actionable strategies to engage employees effectively in IT security awareness training, transforming them into a robust first line of defense for your company.
April 2024
WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP
By Miguel Clarke, GRC and Cyber Security lead for Armor Defense
November 2023
WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?
By Ross Moore, Cyber Security Support Analyst with Passageways
October 2023
A BRIEF HISTORY OF DATA LOSS PREVENTION
Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.
July 2023
THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT
This article will explain cybersecurity awareness and dive deeper into the five essential tips to include in your security awareness training program to make your digital environments more secure.
June 2023
THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023
Learn how to protect your app data using this 8-step security checklist. This article discusses crucial security measures to keep your apps safe in 2023.
April 2023
WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK
What can you do if you’ve identified an employee as a cyber security risk? Let’s explore appropriate responses.
March 2023
THE NETWORK SECURITY CHALLENGE: IMPROVING VISIBILITY TO DEFEND AGAINST CYBERTHREATS
By Kev Eley, Vice President Sales UK and Europe at LogRhythm
January 2023
KEEPING YOUR MEDIA CONTENT SAFE AND SECURE WITH THESE HELPFUL STEPS
For those of us working and operating in the digital landscape, keeping our content safe and secure is a number one priority.
December 2022
SWEDEN LAUNCHES EUROPE’S MOST ADVANCED HUB FOR AUTOMOTIVE CYBER SECURITY
Research Institute engages ethical hackers and the latest research in cyber technology to combat spiraling threats to connected vehicles
November 2022
3 STRATEGIES TO MITIGATE INSIDER THREATS IN YOUR ENTERPRISE
September 2022
By Martin Lee, Technical Lead, Security Research – EMEA, Cisco Talos Security Intelligence & Research
May 2022
By Eyal Dorfman
May 2022
By Iron Range Cyber
April 2022
With ransomware attacks in the healthcare sector on the rise, Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, shares his thoughts on how healthcare organisations can avoid becoming a victim of cyber criminals.
By James Rees, Managing Director, Razorthorn Security
FUELLING THE TALENT PIPELINE IN LONDON REQUIRES SERIOUS INVESTMENT IN CYBER SKILLS
By Dr Vahid Heydari Fami Tafreshi, senior lecturer in Cybersecurity and Networks, Computing Courses Provision Manager at Staffordshire University London
December 2021
By Ruben Bonan Founder of Marketing Marvel
July 2021
By Haya Altaleb and Rajnai Zoltán, Óbuda University, Doctoral School on Safety and Security Sciences
By Dr. Katalin Szenes CISA, CISM, CGEIT, CISSP and Bence Tureczki PhD student, AI – Blockchain – Security Knowledge Center of Óbuda University
February 2021
AND WHY YOU SHOULD CARE
By Ramil Khantimirov, CEO and co-founder of StormWall
By David Balaban, computer security researcher
By Annamária Beláz and Zsolt Szabó, Doctoral School on Safety and Security Sciences, Óbuda University, Budapest, Hungary
September 2020
By Döníz Borsos PhD student, Óbuda University, Doctoral School on Safety and Security Sciences, Hungary
August 2020
By Barnabás Sándor, Óbuda University, Doctoral School for Safety and Security Sciences, Budapest, Hungary
By Csaba Fenyvesi and Ana Miletic
December 2019
SIMPLIFYING IDENTITY AND ACCESS MANAGEMENT FOR MORE BUSINESSES
By Karthik Lakshminarayanan, Director, Product Management, Cloud Identity, Google
October 2018
By Scott Coleman, Director of Product Management – Owl Cyber Defense Solutions
By Veselin Monev, information security and compliance practitioner
August 2018
HUMAN BEHAVIOUR AND DIGITAL TRUST: HOW UNEXPECTED REWARDS CAN IMPROVE CYBERSECURITY, PROTECT CRITICAL INFRASTRUCTURE AND REDUCE COSTS
By Chris A. Jones, George Runger and Jack Caravelli
August 2018
PSD2 – WILL IT BE A GOLD RUSH FOR CYBERCRIMINALS
By Pedro Fortuna, CTO at Jscrambler (www.jscrambler.com)
July 2018