Spotlight on cyber security as a science
Evidence-based cyber resilience decisions can make a quantifiable difference when it comes to material improvements for the global business community, and for society as a whole. While we are still in the foothills of this becoming common practice, our global CTO, Ollie Whitehouse, explores the way that our approach to security is changing.
Ransoms and beyond
As attackers take advantage of the recent rapid digital transformation and move to remote working, Managing Security Consultant, Kenneth Yu, takes a look at some of the most commonly exploited services for ransomware attacks.
The cyber landscape in 2021 and beyond: an opportunity to learn from the present
Our global CTO, Ollie Whitehouse, shares his thoughts on the future of the cyber landscape, including how we can strengthen society’s resilience against threats and create regulatory and legislative regimes fit for the digital age across the globe.
Why ATM security has never gone out of style
Despite a rise in internet-based and cashless banking, ATM security remains as important as ever. Here, Daniel Calvo, Senior Security Consultant, explores the evolution of ATM security and how we can keep these machines secure in the years to come.
Introducing Joining the Dots: exploring our connected environment
As 2020 draws to a close, we’re exploring how this year has transformed our connected environment, and the way we live, work and connect with others.
Who is responsible for keeping my data secure?
As part of our recent Generation Cyber campaign, 43% of respondents told us that they felt that ‘owners of websites or apps’ were responsible for keeping their data secure. But who really is responsible for data security? We asked our head of public affairs, Kat Sommer.
The anti-cheat battle: who will be the winners in the electronic gaming world?
As the video gaming industry continues to grow, cheating remains a big problem – but what is the solution? In this article, Richard Appleby explores how the anti-cheat battle might play out.
Schrems II judgement – what does it mean for privacy and personal data in the UK and US?
In the latest news concerning how the personal data of people in the EU is transferred to the United States, the European Court of Justice has ruled that the protections afforded by the EU-US Privacy Shield are not adequate. In this article, we have simplified the case and decision to help you to understand the changes.
The Computer Misuse Act (CMA) turns 30 years old
Today marks 30 years since the Computer Misuse Act (CMA) received royal assent in the UK. Since 1990, our physical and cyber worlds have evolved drastically, meaning that the Act is now out of date. To mark this occasion, we sat down with our head of public affairs, Katharina Sommer, to find out more about the CMA – including why we should care about it, and what needs to change.
The link between patient safety and cyber security
Although the link between cyber security and patient safety could be considered obvious to some, there are still, perhaps, several key stakeholders that may not have these two views aligned closely enough. Stuart Kurutac, security consultant at NCC Group, explores how we can improve the awareness of the effect that cyber security issues pose to patient safety.
On the Road to Zero Trust in Transport: Introducing Automotive Ethernet
As part of our Always On, Always Here campaign, Security Consultant, Liz James, explains how Automotive Ethernet can make connected vehicles safer and more secure by providing opportunities for zero trust.
A question of trust: how can organisations build strong relationships within supply chain?
Over the past few months, trust has become an even more crucial element of the supply chain. So how can organisations strengthen it? We've explored this with the help of some of our contacts at Burness Paull LLP, the Scottish Business Resilience Centre and the Scottish Government.