Articles


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023
Learn how to protect your app data using this 8-step security checklist. This article discusses crucial security measures to keep your apps safe in 2023.
April 2023


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK
What can you do if you’ve identified an employee as a cyber security risk? Let’s explore appropriate responses.
March 2023


THE NETWORK SECURITY CHALLENGE:  IMPROVING VISIBILITY TO DEFEND AGAINST CYBERTHREATS
By Kev Eley, Vice President Sales UK and Europe at LogRhythm
January 2023


KEEPING YOUR MEDIA CONTENT SAFE AND SECURE WITH THESE HELPFUL STEPS
For those of us working and operating in the digital landscape, keeping our content safe and secure is a number one priority.
December 2022


SWEDEN LAUNCHES EUROPE’S MOST ADVANCED HUB FOR AUTOMOTIVE CYBER SECURITY
Research Institute engages ethical hackers and the latest research in cyber technology to combat spiraling threats to connected vehicles
November 2022


3 STRATEGIES TO MITIGATE INSIDER THREATS IN YOUR ENTERPRISE
September 2022


ADAPTING TO A CHANGING THREAT LANDSCAPE
By Martin Lee, Technical Lead, Security Research – EMEA, Cisco Talos Security Intelligence & Research
September 2022


9 CRUCIAL CYBERSECURITY TIPS FOR YOUR VIRTUAL EVENT
May 2022


CYBERSECURITY TRENDS IN 2022
By Eyal Dorfman
May 2022


INCIDENT RESPONSE SERVICES: WHO’S IT FOR?
By Iron Range Cyber
April 2022

HOW HOSPITALS CAN PREVENT A CYBERSECURITY CRISIS IN HEALTHCARE
With ransomware attacks in the healthcare sector on the rise, Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, shares his thoughts on how healthcare organisations can avoid becoming a victim of cyber criminals.
April 2022


THE UK NATIONAL CYBER STRATEGY 2022: DOES IT GO FAR ENOUGH & WHAT’S TO COME?
By James Rees, Managing Director, Razorthorn Security
March 2022

FUELLING THE TALENT PIPELINE IN LONDON REQUIRES SERIOUS INVESTMENT IN CYBER SKILLS
By Dr Vahid Heydari Fami Tafreshi, senior lecturer in Cybersecurity and Networks, Computing Courses Provision Manager at Staffordshire University London
December 2021


WHAT ARE THE LATEST CYBERSECURITY STANDARDS?
By Ruben Bonan Founder of Marketing Marvel
July 2021

A BRIEF OVERVIEW OF SYSTEMS RELIABILITY
By Haya Altaleb and Rajnai Zoltán, Óbuda University, Doctoral School on Safety and Security Sciences
May 2021


SUPPORTING CORPORATE GOVERNANCE ON A BLOCKCHAIN BASIS
By Dr. Katalin Szenes CISA, CISM, CGEIT, CISSP and Bence Tureczki PhD student, AI – Blockchain – Security Knowledge Center of Óbuda University
February 2021

DDOS PANDEMIC: HOW THE CORONA CRISIS SPURRED SOME OF THE BIGGEST DDOS ATTACKS
AND WHY YOU SHOULD CARE
By Ramil Khantimirov, CEO and co-founder of StormWall
February 2021


HOW RANSOMWARE AUTHORS HIT HEALTHCARE SECTOR
By David Balaban, computer security researcher
September 2020

THE HUMAN FIREWALL – THE HUMAN SIDE OF CYBER SECURITY
By Annamária Beláz and Zsolt Szabó, Doctoral School on Safety and Security Sciences, Óbuda University, Budapest, Hungary
September 2020

APPLICATIONS OF LORAWAN TECHNOLOGY
By Döníz Borsos PhD student, Óbuda University, Doctoral School on Safety and Security Sciences, Hungary
August 2020

WARFLYING – 2.4 GHZ AND 5 GHZ WIRELESS NETWORK DETECTION BY DRONE IN CRITICAL INFRASTRUCTURE
By Barnabás Sándor, Óbuda University, Doctoral School for Safety and Security Sciences, Budapest, Hungary
March 2020


MONITORING AND ANALYZING SOCIAL MEDIA TO PROTECT CRITICAL INFRASTRUCTURE
By Csaba Fenyvesi and Ana Miletic
December 2019

SIMPLIFYING IDENTITY AND ACCESS MANAGEMENT FOR MORE BUSINESSES
By Karthik Lakshminarayanan, Director, Product Management, Cloud Identity, Google
October 2018


WHAT IF YOU CAN’T PATCH? 
By Scott Coleman, Director of Product Management – Owl Cyber Defense Solutions
September 2018


COGNITIVE BIASES IN INFORMATION SECURITY CAUSES, EXAMPLES AND MITIGATION
By Veselin Monev, information security and compliance practitioner
August 2018

HUMAN BEHAVIOUR AND DIGITAL TRUST: HOW UNEXPECTED REWARDS CAN IMPROVE CYBERSECURITY, PROTECT CRITICAL INFRASTRUCTURE AND REDUCE COSTS
By Chris A. Jones, George Runger and Jack Caravelli
August 2018


PSD2 – WILL IT BE A GOLD RUSH FOR CYBERCRIMINALS
By Pedro Fortuna, CTO at Jscrambler (www.jscrambler.com)
July 2018


MILIPOL QATAR – THE REGION’S LEADING INTERNATIONAL EVENT DEDICATED TO HOMELAND SECURITY AND CIVIL DEFENCE IN THE MIDDLE EAST
By Milipol Qatar communications team
July 2018


CYBER AND THE HEALTHCARE INDUSTRY
By UK Security Expo team
September 2017

TAMING INFORMATION OVERLOAD FOR EFFECTIVE BORDER CONTROLS
By Nate Carpenter from Securiport; Speaker at Interpol World 2017
June 2017

BACK TO THE FUTURE: CONTINUAL SECURITY FOR SMALL MEDIUM BUSINESS
By Miss Kiran Bhagotra, CEO & Founder, ProtectBox – www.protectbox.com
March 2017

A MARINE GROUP CIO’s ACCOUNT OF HIS JOURNEY AGAINST THE DIGITAL DARK SIDE
CYBER SECURITY: ARE WE BARKING UP THE WRONG TREE?
By Ken Soh, CIO of BH Global Corporation
March 2017

GUIDE TO DDoS MITIGATION AND TESTING
By Max Pritchard, pre-sales consultant, activereach
March 2017

WHO’S WATCHING YOU?
By Dominic Lyons, a Senior Technical Pre-Sales Network Architect at Tellemachus
November 2016

CYBER INSIDER RISK MITIGATION MATURITY MATRIX
By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL
November 2016

THE RAPID EVOLUTION OF THE RANSOMWARE INDUSTRY
By Patrick Vibert, Senior Consultant, Cyber Threat Intelligence, Control Risks
September 2016


INTERNATIONAL COLLABORATION
JAPAN AND ISRAEL’s CYBER COOPERATION FOR THE 2020 OLYMPIC GAMES
By Ori Bar-Chaim, Director General at Regional Branch of Custodio Pte. Ltd – a subsidiary of Israel Aerospace Industries (IAI) and Camila Edry, Department Manager of Cyber Centers at Cyber Directorate – Elta, IAI
July 2016


SMART CITIES: THE IMPLICATIONS FOR THE PRIVATE SECTOR
By Nicolas Reys, Consultant, Control Risks Cyber Security Services
July 2016


THE INSIDER SECURITY THREAT
HOW SHAREPOINT AND OFFICE 365 MEASURE UP
By Peter Bradley, CEO of Torsion Information Security
July 2016


AP[email protected]: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT
By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army
February 2016


CRITICAL INFRASTRUCTURE AND OPERATIONAL TECHNOLOGY SECURITY
By Dr. Yiftah Lipkin (Israel Aerospace Industries Ltd), Amir Shlomo (Israel Aerospace Industries Ltd),
Amir Paz (Israel Aerospace Industries Ltd), David Menaker (Israel Aerospace Industries Ltd),
Guy Mizrahi, (Cyberia advanced cyber solutions [IAI’s Cyber accessibility center]), Niv David (Tel Aviv University)
November 2015


CYBERSECURITY WON’T EVOLVE IF WE’RE ONLY CLEANING UP AFTER A BREACH
By Ryan Olson, Intelligence Director at Palo Alto Networks
November 2015


A CONJOINT APPROACH: USER-CENTRIC AND DATA-CENTRIC SECURITY
By Dan Solomon, Director of Cyber Risk And Resilience Services, Optimal Risk Management and Arye Gickman, C.E.O, Longsight
November 2015


CONTROL-SYSTEM SECURITY ATTACK MODELS
By Andrew Ginter, VP Industrial Security, Waterfall Security Solutions
November 2015


CYBERSECURITY: A CALL FOR NATIONAL STRATEGY
By Yajan Dua, Aerospace & Defence Analyst, MarketsandMarkets
June 2015


THE CURRENT STATE OF CYBER WARFARE
By Lior Tabansky, Cyber Security Policy Expert, Tel Aviv University, the Yuval Ne’eman Workshop for Science, Technology and Security
May 2015


CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION
OPPORTUNITIES, SYNERGIES AND CHALLENGES
By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer at EUMS CIS Directorate.
May 2015


CYBER SECURITY ATTRIBUTES FOR CRITICAL INFRASTRUCTURE SYSTEMS
By Hugh Boyes CEng FIET CISSP, Cyber Security Lead, Institution of Engineering and Technology (IET).
May 2015


CYBER INSIDERS: A BOARD ISSUE
By Chris Hurran, OBE. Senior Associate Fellow of the Institute for Security and Resilience Studies at University College London.
May 2015


CYBER SECURITY FOR THE DEFENCE INDUSTRY
By Sanjana Sharma, Aerospace & Defense Analyst, MarketsandMarkets
May 2015


THE SURGE IN THE CYBER SECURITY MARKET
By Neha Gangwani and Apurva Chaudhari, Aerospace and Defense Analysts, Markets and Markets
May 2015


NEVER SURRENDER – A SOBER, YET OPTIMISTIC, VIEW OF THE FIGHT AGAINST CYBER THREATS
By Aaron (Ronnie) Eilat, General Manager, Custodio Pte Ltd, IAI’s cyber early warning R&D Center in Singapore
April 2015


MAKING SENSE OF THREAT INTELLIGENCE
UNDERSTANDING HOW TO LEVERAGE THREAT INTELLIGENCE WITHIN THE CYBER SECURITY ATTACK DETECTION AND RESPONSE PROCESS
By Piers Wilson, Head of Product Management, Tier-3 Huntsman
April 2015


SecuSUITE FOR BLACKBERRY 10 REDEFINES COMMUNICATION
By Dr. Hans-Christoph Quelle, CEO of Secusmart GmbH
April 2015


DATA PROTECTION AND PRIVACY 
LEARNING LESSONS FROM DATA BREACHES
By Piers Wilson, Head of Product, Management, Tier-3
April 2015


APPLYING MACHINE LEARNING TO ADVANCE CYBER SECURITY ANALYTICS
By Matt Wolff, Chief Data Scientist at Cylance
April 2015


THE END OF REACTIVE SECURITY, AND THE MOVE TO A DOCTRINE OF CYBER DEFENCE?
By Dan Solomon, Advanced Cyber Defence Services at Optimal Risk
June 2014