Julio
![Why threat actors love your summer holiday plans](/sites/default/files/styles/wide/public/2024-07/shutterstock_2258741125%20%281%29.webp?itok=V8C0KljN)
Why threat actors love your summer holiday plans
Whether you're heading off on a city break or getting ready to hit the beach, threat actors are waiting for your cyber defences to relax over the holidays too. Kevin Groves sets out what organisations can do to ensure that threat actors don't get to take advantage of a well-earned rest.
![Litigation readiness: the key to navigating the aftermath of a cyber incident](/sites/default/files/styles/wide/public/2024-07/shutterstock_1690468615.webp?itok=jgwJHT2D)
Litigation readiness: the key to navigating the aftermath of a cyber incident
Legal action tends to follow in the wake of a cyber incident, but preparing for lawsuits is an aspect of cyber defence that many organisations neglect. Martin Nikel, Director of eDiscovery and Litigation Support, always highlights the importance of timely data preservation to clients. In this week's Cyber Series, Martin explains why it's essential to preserve data, including communications before, during, and post-breach, as soon as litigation becomes a possibility.
![Incident response plans: The journey is as important as the destination](/sites/default/files/styles/wide/public/2024-07/shutterstock_2331392161%20%281%29.webp?itok=N5b7Okg1)
Incident response plans: The journey is as important as the destination
In an era where cyber threats are ubiquitous and increasingly sophisticated, having a robust cyber incident response plan (CIRP) is indispensable for any organisation. However, the process of developing this plan is as critical as the finished document itself.
Join our guides Alistair Purdy and James Thoburn as they explain how this journey to creating a CIRP, whether on your own or with expert support, fosters a deeper understanding of your organisation, strengthens its defences, and ensures a state of preparedness that a pre-packaged plan simply cannot provide.
![June Cyber Summary](/sites/default/files/styles/wide/public/2024-07/shutterstock_2304718219%20%281%29.webp?itok=RiSiz4oP)
June Cyber Summary
In this week's Cyber Series, threat intelligence lead Stephen Green summarises just what happened when the Qilin group's attack on an NHS provider caused massive disruptions across hospitals in London; reveals the infiltration of Scattered Spider's web by law enforcement, and explains why the LockBit gang got caught out by greatly exaggerating (or lying) about its exploits.
Junio
![The cyber security retainer explainer](/sites/default/files/styles/wide/public/2024-06/shutterstock_2164025125.webp?itok=Vmz7PJtC)
The cyber security retainer explainer
A cyber security retainer is – or should be – an essential part of overall risk management. But what is a cyber security retainer, exactly? Why does it matter so much? And how do you know you're getting value for money?
From the cost efficiencies to the peace of mind that comes from knowing that experts have your back, Kevin Groves and Edward Starkie explain the ins and outs of cyber retainers and why you don't want to start thinking about them only after an incident is underway.
![Cybersecurity regulation: What should we expect?](/sites/default/files/styles/wide/public/2024-06/shutterstock_2290906973%20%281%29.webp?itok=G3xNm7nL)
Cybersecurity regulation: What should we expect?
From AI-washing to operational resilience, regulators have a lot to think about when it comes to cybersecurity -- which means the organisations they regulate have a lot to think about too. Ed Starkie looks at what can be expected from cybersecurity regulation over the next few years, based on the current direction of travel and recent case law.
![Personal liability and the CISO: The consequences of accountability](/sites/default/files/styles/wide/public/2024-06/shutterstock_2341874531.webp?itok=q9ypfItC)
Personal liability and the CISO: The consequences of accountability
When most of us discuss cybersecurity threats, we tend to focus on the threat actor and their actions. But in the wake of many recent major cyber incidents, the actions taken (or not taken) by CISOs are under just as much scrutiny as those of the threat actors. CISOs are increasingly being held personally responsible for cybersecurity failings.
Edward Starkie explains why this is, and why holding CISOs accountable for cybersecurity weaknesses could benefit CISOs in the long run.
![Mythbusting: Realising value from cybersecurity in M&A due diligence](/sites/default/files/styles/wide/public/2024-06/shutterstock_2044137938.webp?itok=cqMCsuYx)
Mythbusting: Realising value from cybersecurity in M&A due diligence
Despite the increasing emphasis on cybersecurity and the part it plays in the economy, there are still some widely held misconceptions about its role in the M&A process. This knowledge gap creates common pitfalls and missed opportunities for investors. Ed Starkie busts some common myths about cybersecurity and M&A due diligence in this week’s edition of Cyber Series.
Mayo
![May in review: UniSuper weathers storm after Google Cloud glitch](/sites/default/files/styles/wide/public/2024-05/shutterstock_2203488697_0.webp?itok=2h8mvJsj)
May in review: UniSuper weathers storm after Google Cloud glitch
May was another eventful month in cyberspace:
- The US SEC has announced a regulatory update that will put pressure on financial institutions to better protect client data
- Australian pension fund UniSuper lost its data – twice! – thanks to a “glitch” with Google Cloud
- Law enforcement scored a rare win against a dark web marketplace (at least for now).
Join threat intelligence lead Stephen Green for a review of the month that was and a look at the trending digital threats facing the financial sector.
![Review and strengthen: How to get value from a penetration test](/sites/default/files/styles/wide/public/2024-05/shutterstock_2283463447.webp?itok=VC4za9Pg)
Review and strengthen: How to get value from a penetration test
So you have your pen test results – now what? In part 2 of our look at how to get the most out of your penetration testing, Ed Starkie, Director of Governance, Risk and Compliance (Cyber) explains why the actions you take after your pen test are as important as the test itself.
Paginación
- Página 1
- Siguiente página