Cyber League: UK's NCSC Calls on Industry Experts to Join its Fight Against Cyber Threats

Cyber League: UK's NCSC Calls on Industry Experts to Join its Fight Against Cyber Threats

The United Kingdom’s National Cyber Security Centre is inviting members of the cybersecurity community to join its new Cyber League, which is a collective of industry experts that will work alongside the government agency to tackle security threats facing the U.K. Announced by the NCSC on Jan. 17, the Cyber League will support existing NCSC initiatives that bring together experts from the public and private sectors. This is with the aim of improving knowledge sharing…

Read More

Cybersecurity professionals to newcomers: Focus on vendor-neutral certifications

Cybersecurity professionals to newcomers: Focus on vendor-neutral certifications

Cybersecurity professionals to newcomers: Focus on vendor-neutral certifications | 2021-07-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The new threat economy: A guide to cybercrime’s transformation – and how to respond

The new threat economy: A guide to cybercrime’s transformation – and how to respond

The new threat economy: A guide to cybercrime’s transformation – and how to respond | 2021-06-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Defeating password spraying attacks

Defeating password spraying attacks

Defeating password spraying attacks | 2021-03-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

WSJ Executive Forum: Advancing security in the new business environment

WSJ Executive Forum: Advancing security in the new business environment

WSJ Executive Forum: Advancing security in the new business environment | 2021-03-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Leveraging gamification for security awareness training

Leveraging gamification for security awareness training

Leveraging gamification for security awareness training | 2021-01-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

U.K.’s University of Kent establishes cybersecurity and conflict institute

U.K.’s University of Kent establishes cybersecurity and conflict institute

U.K.’s University of Kent establishes cybersecurity and conflict institute | 2021-01-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

The first line of defense: Why employees are the key to stronger cybersecurity

The first line of defense: Why employees are the key to stronger cybersecurity

The first line of defense: Why employees are the key to stronger cybersecurity | 2021-01-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

A hundred-year-old secret is key to fighting cyberattacks

A hundred-year-old secret is key to fighting cyberattacks

A hundred-year-old secret is key to fighting cyberattacks | 2020-12-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Data-driven cyber risk assessment can bolster business continuity

Data-driven cyber risk assessment can bolster business continuity

Data-driven cyber risk assessment can bolster business continuity | 2020-12-24 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2 3