DORA Is Here – But Readiness Concerns Are Far from Over

For months, the impending Digital Operational Resilience Act (DORA) deadline has dominated boardroom discussions across the financial sector with its potential to reshape operational and regulatory practices. Now that DORA is officially in effect, attention has shifted to other matters, such as a new US presidential inauguration, AI, and fiscal concerns for 2025. Yet DORA […]
Guess Who’s Hiding in Your Supply Chain

Hackers don’t always come knocking at the front door. Many organisations are unwittingly leaving a virtual welcome mat with a key beneath it at access points across their supply chain. A lack of visibility in an organisation’s supply chain can leave vulnerable entry points exposed for bad actors and open an organisation up to unnecessary […]
From Accidental Hacker to Cybersecurity Champion: The Story of Dr. Katie Paxton-Fear, Bug Bounty Hunter with HackerOne

Picture this: A young computer scientist accidentally stumbles into a live hacking event and walks away having found vulnerabilities in Uber’s system. This isn’t the plot of a tech thriller – it’s the real-life story of Dr. Katie Paxton-Fear, age 30, whose “happy accident” in 2019 transformed her from a data scientist into one of […]
Cybersecurity: The “What”, the “How” and the “Who” of Change

The time has come for top leaders to own the problem back and address it as they would any other business challenge Cybersecurity budgets appear to be on the rise, driven by increasing regulatory pressure and relentless threats. In fact, there is still a dominant line of thought in the industry pointing towards chronic underinvestment as being the […]
Cybersecurity in retail: What does the future hold?

With the retail industry evolving at a rapid rate, technological innovation has played a critical role in offering a competitive advantage to retailers. However, while technology brings immense benefits, it also introduces vulnerabilities that need to be addressed. Technologies such as Gen AI are helping to transform the industry by combating common customer pain points […]
Automation and AI part of a more robust approach to strengthening cyber defences across government

The National Audit Office (NAO) is putting the finishing touches to a report examining the UK government’s approach to improve its cyber resilience amid escalating threats. According to its brief, the spending watchdog will look at a number of issues, not least current threat levels, funding and whether the government has a sufficiently robust plan […]
Geopolitical crises bring state and commercial hackers together

Nation state cyber spies from Iran and North Korea are increasingly cooperating with commercial ransomware gangs to cause damage in Western corporate networks. Impacting organisations, and therefore, the economy in the West serves the aims of these countries. The lines between nation state and financial motivation are blurring, including their skills and equipment. The research […]
The CISO, the CSO and the Future of the Cybersecurity Organization

For many firms, it is a cultural transformation that is required, not just the implementation of some new tools. Recent surveys continue to paint the picture of a fairly unhappy CISO community, hopping from job to job, trapped in failed and endless bottom-up games with senior executives in their attempts to justify their views of what needs to be […]
Cyber Fusion: a next generation approach to NIS2 compliance

The NIS2 Directive, which came into force in October, imposes extensive cyber risk management, incident reporting, business continuity, and information sharing obligations on a much greater number of organisations – around 30,000 compared to the 3,000 previously affected by NIS1. The directive also introduces significantly higher penalties and sanctions for organisations that fail to comply […]
Navigating the Evolving Threat Intelligence Landscape and Organisational Responsibility

Cyber Rhino Threat Week (which took place from 9th to 13th December 2024) aims to inform, sharing threat intelligence insights and best practices with our customers, partners and industry ecosystem. This keynote session certainly set the stage for the week, exploring the complexities that organisations must consider when establishing and operating an effective Cyber Threat Intelligence (CTI) […]