off

SOAR versus Security Operations: What’s Really Going On?

There’s something big brewing in the world of security operations, but what exactly is it? We’re regularly inundated with various descriptions of useful tools and capabilities – think Security Orchestration, Automation and Response (SOAR), Threat Intelligence...
Posted On 29 Aug 2019
Jonathan Couch
off

Cyber Security: Attack Vectors Across the Next 12 Months

Cyber security professionals are currently busy sharing their predictions for the coming year, writes Jonathan Couch, who’s not a big fan of these types of predictions. That’s because what actually happens in any given year tends to be more of the same with one or two new,...
Posted On 06 Feb 2019
off

Industrial Control Systems: Securing The Heartbeat of Critical Infrastructure

Industrial Control Systems (ICS) are a specialised set of physical and cyber systems that drive production for critical infrastructure industries such as power generation and distribution, oil production and refining, chemical manufacturing and more, observes Mark Carrigan. ICS...
Posted On 23 Oct 2018
off

Verizon report highlights link between PCI DSS compliance and defence against cyber attacks

With cyber crime on the increase, payment card security is increasingly a focus for companies and consumers alike. The Payment Card Industry Data Security Standard (PCI DSS) is there to help businesses accepting card payments to protect their payment systems from breaches and...
Posted On 04 Sep 2017
off

PwC to recruit over 1,000 technology specialists for its UK Risk Assurance business by 2020

PwC’s UK Risk Assurance practice is on track to recruit more than 1,000 technology specialists over the next four years in order to meet increasing client demand for digital, regulatory and cyber security services. The new recruits will work across all industry sectors in London...
Posted On 23 Aug 2016
Brian Chappell
off

How do we close ‘The Vulnerability Gap’?

Managing vulnerabilities is a significant challenge for many organisations, with the main difficulties manifest in two key areas, writes Brian Chappell. The first is that the list isn’t static. It seems that new vulnerabilities are discovered almost daily, adding to our list...
Posted On 14 Oct 2015