Data Protection vs. Cyber Resilience: Mastering Both in a Complex IT Landscape

Today’s always-on, hyperconnected world requires CIOs to confront two equally important concepts: data protection and cyber resilience. As reliance on data to fuel analytics, engineering, marketing, and other key operations increases, the complexity surrounding IT infrastructure grows in tandem. Hybrid workforces, edge computing, cloud-native applications, and legacy systems add further complexity to the mix. Meanwhile, […]

Burnout, budgets and breaches – how can CISOs keep up?

Cyber-attacks continue to dominate headlines, disrupting operations and putting sensitive data at risk. In the wake of the AI boom, threats are growing more complex. The endless game between attacker and defender is intensifying, and defenders know the stakes are high.  Security teams face a widening skills gap, growing threat complexity and tighter budgets. It’s […]

Why Codefinger represents a new stage in the evolution of ransomware

Forget typical ransomware! Codefinger hijacked cloud keys directly, exposing backup flaws and shared responsibility risks. Time to rethink defence. If you didn’t pay much attention to news of the recent Codefinger ransomware attack, it’s possibly because ransomware has become so prevalent that major incidents no longer feel notable. But Codefinger is not just another ransomware breach […]

The Curse of the Decade for Many CISOs

It’s often trying to go too fast with the wrong leadership baggage that drives CISOs to failure. The cybersecurity narrative on social media remains driven by the misleading messages of tech vendors, and dominated by considerations of insufficient investments and challenges in convincing top execs. It has been the case for as long as I have been […]

Why database security needs a seat at the cyber strategy table

As organisations invest more heavily in their cybersecurity strategies, the focus often leans toward endpoint protection, firewalls, and threat detection tools. Yet, one of the most valuable and vulnerable components, the database, can still be overlooked. With cyberattacks growing in volume and sophistication, securing databases should no longer be a back-office concern. It must be […]

What to Watch in Security and Networking in 2025

2025 will see cybersecurity challenges continuing to evolve, security breaches becoming ever more sophisticated, and organisations accelerating their adoption of SASE and SSE in response. To handle these rapid developments in the offensive and defensive cyber strategies, corporate networks must be built and managed to ensure that, whatever happens, downtime can be mitigated and reduced […]

Why Conventional Disaster Recovery Won’t Save You from Ransomware

The conventional formula for maintaining business continuity in the face of unexpected IT disruptions is as follows: Back up your data. Make a recovery plan. Test the recovery plan periodically. That approach may work well enough if your primary concern is defending against risks like server failures or data centre outages caused by natural disasters. […]

The Importance of Information Sharing to Achieve Cybersecurity Resilience

In the face of increasingly advanced global cyber threats, companies are embedding information sharing as a crucial part of their threat detection, response, and mitigation strategies – we are stronger together when we act this way. By quickly identifying patterns and indicators of compromise, organisations can gain the necessary insights to enhance their cybersecurity resilience. […]