Data Protection vs. Cyber Resilience: Mastering Both in a Complex IT Landscape

Today’s always-on, hyperconnected world requires CIOs to confront two equally important concepts: data protection and cyber resilience. As reliance on data to fuel analytics, engineering, marketing, and other key operations increases, the complexity surrounding IT infrastructure grows in tandem. Hybrid workforces, edge computing, cloud-native applications, and legacy systems add further complexity to the mix. Meanwhile, […]
Burnout, budgets and breaches – how can CISOs keep up?

Cyber-attacks continue to dominate headlines, disrupting operations and putting sensitive data at risk. In the wake of the AI boom, threats are growing more complex. The endless game between attacker and defender is intensifying, and defenders know the stakes are high. Security teams face a widening skills gap, growing threat complexity and tighter budgets. It’s […]
Why Codefinger represents a new stage in the evolution of ransomware

Forget typical ransomware! Codefinger hijacked cloud keys directly, exposing backup flaws and shared responsibility risks. Time to rethink defence. If you didn’t pay much attention to news of the recent Codefinger ransomware attack, it’s possibly because ransomware has become so prevalent that major incidents no longer feel notable. But Codefinger is not just another ransomware breach […]
The Curse of the Decade for Many CISOs

It’s often trying to go too fast with the wrong leadership baggage that drives CISOs to failure. The cybersecurity narrative on social media remains driven by the misleading messages of tech vendors, and dominated by considerations of insufficient investments and challenges in convincing top execs. It has been the case for as long as I have been […]
Organisations are investing millions in cybersecurity infrastructure – there needs to be a greater focus on their people

With beloved UK retailer M&S experiencing a crippling ransomware attack last month, the reputational and financial repercussions of cyberattacks – and the impact of prolonged downtime – have once again been thrown into the spotlight, with an estimated £700 million wiped off its valuation in one week. As a complex organisation with a significant physical […]
Why database security needs a seat at the cyber strategy table

As organisations invest more heavily in their cybersecurity strategies, the focus often leans toward endpoint protection, firewalls, and threat detection tools. Yet, one of the most valuable and vulnerable components, the database, can still be overlooked. With cyberattacks growing in volume and sophistication, securing databases should no longer be a back-office concern. It must be […]
What to Watch in Security and Networking in 2025

2025 will see cybersecurity challenges continuing to evolve, security breaches becoming ever more sophisticated, and organisations accelerating their adoption of SASE and SSE in response. To handle these rapid developments in the offensive and defensive cyber strategies, corporate networks must be built and managed to ensure that, whatever happens, downtime can be mitigated and reduced […]
Automation, cloud technologies and strategic clarity are key to surviving the cyber arms race

The UK Government is warning British businesses to bolster their cyber security to “help defend the nation from actors with malign intent.” Addressing the recent NATO Cyber Defence Conference in London, the Chancellor of the Duchy of Lancaster, Pat McFadden, warned that adversaries malign – including Russia – were already engaged in cyber warfare that […]
Why Conventional Disaster Recovery Won’t Save You from Ransomware

The conventional formula for maintaining business continuity in the face of unexpected IT disruptions is as follows: Back up your data. Make a recovery plan. Test the recovery plan periodically. That approach may work well enough if your primary concern is defending against risks like server failures or data centre outages caused by natural disasters. […]
The Importance of Information Sharing to Achieve Cybersecurity Resilience

In the face of increasingly advanced global cyber threats, companies are embedding information sharing as a crucial part of their threat detection, response, and mitigation strategies – we are stronger together when we act this way. By quickly identifying patterns and indicators of compromise, organisations can gain the necessary insights to enhance their cybersecurity resilience. […]