For some curious reason, the Statement of Applicability steals the limelight in the ISO27k world, despite being little more than a formality. Having recently blogged about the dreaded SoA, ’nuff said on that.Today I’m picking up on the SoA’s shy …
#InfosecurityEurope2022: How Should SMEs Defend Against Cyber-Risks?
A panel of experts discussed practical strategies to implement security on a budget
#InfosecurityEurope2022: Lawyers Update Security for New Ways of Working
Securing end points is just one challenge facing firms in the legal sector
#InfosecurityEurope2022: Disinformation Warfare – How Do We Tackle Fake News?
Ian Hill hosted a roundtable discussion on disinformation warfare
#InfosecurityEurope2022: The NCSC Sets Out the UK’s Cyber Threat Landscape
Marsha Quallo-Wright, deputy director for critical national infrastructure at the NCSC, discusses the latest cyber threat trends impacting the UK
#InfosecurityEurope2022: Actions Not Words: Hacking the Human Through Social Engineering
Jenny Radcliffe, The People Hacker, points to what cybersecurity can learn from a social engineer
The Relentless Evolution of DDoS Attacks
Explore how DDoS attacks are practically unrecognizable from those of the past few years thanks to constant innovation in the threat landscape
#InfosecurityEurope2022: Firms Look To Align Security and Business Risk
Boards increasingly expect to see a return on their investment in cybersecurity
#InfosecurityEurope2022: Focus on End-User Behaviors to Enhance Security
Having metrics in place is crucial to tailoring staff awareness training programs effectively
Cloud Email Threats Soar 101% in a Year
Experts warn of evolving social engineering techniques