This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Moving in the circles I do, I’ve noticed a concerning trend. The modern enterprise C-suite is undergoing a seismic shift—not over profits or market share, but over who leads technology, shapes strategy, and ultimately defines the future of the business. For decades, the Chief Information Officer (CIO) was the central authority on IT, overseeing infrastructure, systems, and digital initiatives.
Everyone’s talking about AI aren’t they, and when I gave a keynote on Artificial Intelligence and cybersecurity recently, I relayed how the rise of AI has brought us to a pivotal moment in historya moment brimming with both extraordinary opportunity and unparalleled risk. Central to this debate, though, is the approach that nations are taking toward regulation.
Cybersecurity has entered a new era. What was once a contest of firewalls and intrusion detection, is now a high-stakes game driven by AI. On one side, defenders are using AI to predict, prevent, and respond to cyber threats with precision. On the other, hackers are harnessing the same technology to outpace defences, sharing AI-enhanced strategies that make them faster, smarter, cheaper and more adaptable.
After joining Vanessa Feltz on Channel 5 to talk all things scams, I wanted to follow up with a clear guide for anyone whos ever been targeted or worries they might be next. Scams today arent just dodgy emails or shady phone calls. Fraudsters use AI, social engineering, and emotional manipulation to steal not just money, but also trust, time, and peace of mind.
Ask yourself this question: why are hackers often more effective at collaboration than the organisations they’re targeting? This was something I did a week ago via a poll, and you can see the results here. Recent cyberattacks on major UK retailers like Marks & Spencer, the Co-op, and Harrods by the infamous “Scattered Spider” group underline a harsh reality in cybersecurity.
It’s the May Bank Holiday, and as I sit at my desk, working, unanswered questions continue to swirl around the recent cyberattacks on Marks & Spencer (M&S) , the Co-op , and Harrods , leaving the full scope and implications of these breaches uncertain. Allegedly orchestrated by the same group known as Scattered Spider, these attacks highlight the significant challenges even the most respected and established brands face in defending against modern cyber threats.
Music and sports have always had the power to unite us. They transcend differences, bring people together, and remind us of the beauty in being different. But if we switch our focus to the world of technology, we seei a starkly different picturea landscape increasingly shaped by control, compliance, and automation. The rapid advancement of technology, particularly in AI and automation, is transforming the way we interact with the digital world.
Imagine building a house on sand or precariously stacking blocks in a game of Jenga. No matter how carefully you place the materials or how advanced the tools you use, the structure is doomed to collapse without a strong, stable foundation. This is the state of cybersecurity today. Organisations invest heavily in governance, risk, and compliance (GRC) and risk management efforts while neglecting foundational elements like leadership and culture.
One of my friends, Greg van der Gaast tells this great story that perfectly illustrates one of the biggest challenges we face in cybersecurity today. It goes something like this… “Imagine someone who loves coffee. They have a fantastic coffee shop just steps from their home, serving the best lattes and espressos in town. But instead of strolling over to enjoy this local gem, they hop in their car and drive miles away for an average cup from a chain caf.
Small businesses make up 90% of the global business population. They’re not just the soul of local economiesthey’re essential links in global supply chains and the heartbeat of innovation. Yet in todays AI-driven, connected digital world, many of them are facing a threat theyre reluctant to see, hear, or acknowledge. Just like the three wise monkeys , some small business owners are unintentionally following a philosophy of see no risk, hear no warning, speak no threat when it comes t
On October 8, 2012, I had the rare opportunity to sit down with Donald Trump for an hour. At that time, he was best known as a larger-than-life business figure and reality TV star, a figure whose bold approach to success, while not without controversy, fascinated manyincluding me. Back then, I found his perspective compelling. But over the years, much has changed, both in my own perceptions and in the broader understanding of his often polarising and divisive rhetoric.
For nearly a decade, we’ve heard the same discussion in cybersecurity circles about the gender diversity problem. As the first women owned penetration testing provider in the UK some 28-years ago, Ive researched, campaigned, written, spoken and stepped up as a visible role model, always presenting the business case. I’ve also watched how panels, passion projects, and awareness campaigns touting the need for inclusivity and diversity have come and gone including my own.
When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people.
It had been another long day, and I’d let the non-stop barrage of tasks and notifications, each one demanding more bandwidth than I had to spare, get to me. As I sat in my kitchen, chatting to my daughter about the amount of pings each of us got, an uncomfortable thought surfaced. A few minutes earlier, Id been scrolling through LinkedIn when a video caught my attention.
Cybersecurity is on the brink of significant transformation as we approach 2025, grappling with escalating complexities driven by advancements in technology, increasing geopolitical tensions, and the rapid adoption of AI and IoT. In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape.
As cybersecurity matures, the concept of resilience has taken on new dimensions, at least according to Commvault’s CEO, Sanjay Mirchandani. Attending their annual global event series, SHIFT , in London recently, he redefined the future of business resilience in his keynote address and positioned the concept of continuous business—a ground-breaking state of perpetual availability and robustness which revolves around four pivotal elements: 1.
Drama. It’s something we often associate with TV shows and movies, but it has a sneaky way of infiltrating even the most professional environments, including cybersecurity. With recent events like the CrowdStrike IT outage causing global disruption and significant financial losses, and the controversial Palo Alto Networks-sponsored event at Black Hat USA , where models were presented as mannequins adorned in evening wear with lampshades obscuring their faces, it’s evident that the cy
Recently, the world witnessed one of the biggest IT outages in history when CrowdStrike, a renowned cybersecurity firm, with a customer base of around 24,000, caused an unprecedented IT outage and Blue Screen of Deaths (BSODs) for Microsoft Windows devices, globally. It’s astonishing how routine maintenance and a glitch in software can lead to global chaos whereby banks, airlines, train companies, telcos, healthcare providers, supermarkets, TV and radio broadcasters are taken offline, and the co
Gordon Moore, a co-founder of Intel, the “father of Silicon Valley,” and well known for “Moore’s Law” once famously said, “Whatever has been done can be outdone.” Tech leaders understand this. They know that becoming agile, strategic, and resilient is not just a goal but a necessity. To compete and win in challenging times such as these, means investing in tech wisely, reducing CapEx and OpEx spend, attracting and retaining top talent, innovating continu
As we emerge from an intense season of industry conferences like Infosec and RSA, I believe the cybersecurity community finds itself at a critical juncture. While hot topics like AI’s role in combating hacker threats has dominated discussions, an equally significant issue has remained— mental health and burnout. As an industry veteran, having spent over two decades in cybersecurity, I’ve been thinking a lot about the current state of the field—our relentless pursuit of productivity,
Last week I got to participate in one of the most fun (and glamorous) events I’ve ever had in cyber – the 77th Cannes Film Festival. Curtesy of Mastercard and the Mastercard Cyber and Intelligence team, myself and 4 other leaders in cybersecurity were invited to Cannes to walk the red carpet, and watch a premier. It was Francis Ford Coppola’s $120m self-funded dystopian epic, Megalopolis!
Could artificial intelligence (AI) be the key to outsmarting cyber threats in an increasingly connected world? Is it our only hope for survival?These are questions I’ve been asking myself recently as AI and cybercrime have become hot topics in the tech industry, and for world leaders. On one hand, AI has been hailed as a game-changing technology with the potential to transform industries and improve our daily lives.
Recently, a friend of mine who’s just started her own cybersecurity business asked me what I wished I’d known before starting my own business, two decades ago. Having swapped backstories with other “successful” entrepreneurs — including all those not so glamorous aspects — I couldn’t help but write this for her, and for others who are starting out or scaling.
When you think about trust in the digital landscape, what comes to mind? Is it the security of personal information, the reliability of online transactions, the authenticity of digital identities? Or is it ISACA’s definition of digital trust as being the confidence in relationships and transactions. Or it is Nobel laureate and economist Kenneth Arrow’s view, as a “lubricant” in a social system?
I’ve been thinking about what it means to be human in our rapidly evolving digital landscape, and how interactions once filled with personal nuances are now frequently handled by algorithms and artificial intelligence. And I can’t help but be concerned that technology, especially advancements in artificial intelligence, is not just reshaping our world; it’s actually reshaping our identity and the fabric of trust that binds us.
In the tapestry of human interactions, the words ‘kind’ and ‘nice’ are often woven together so tightly that their distinct threads seem indistinguishable. On the surface, both suggest a pleasantness, a quality of being agreeable or gentle in nature. But is there more to it? Could these two seemingly synonymous words actually spell out different narratives in the screenplay of our lives?
International Women’s Day is one of those annual landmarks that shouldn’t just be about the magnolia-laden rhetoric and floral tributes. It’s a day that should starkly remind us of the work left undone, the chasms unbridged, and the opportunities squandered due to the gender divide. It’s a day to reflect on why we need to not just celebrate women but invest in their limitless potential.
Recently, a friend posted a wonderful piece attributed to their hero, the CISO. I disagreed and immediately felt like a party pooper. But, I had to do it. Here’s why. In business today, the role of a CISO is crucial. With the consistency and severity of cyber attacks and data breaches worsening, compliance becoming a minefield, organisations are turning to (and paying) CISOs for protection and guidance.
Every Valentine’s Day, we’re inundated with imagery of passion. In the business world, too, passion is often heralded as a key ingredient for success. But I dare to offer a different perspective, one rooted in the virtues of love. You see, I believe in love. It’s always the answer to a problem. The antidote to fear. The source of inspiration.
In last week’s blog (part 2), I continued to explore the pros and cons of using an MDR provider and whether it’s better choosing a boutique provider over that of a traditional big brand. Having begun by discussing the first core feature, technology, I then focused on the second core feature, contract terms. I wove in many data points, including some from Managed Threat Detection and Response firm, e2e-assure, who I’m partnering with, and their latest report, Rejuvenating Cyber Defence Strategies
In last week’s blog I started to explore the pros and cons of using an MDR provider and whether it’s better choosing a boutique provider over that of a traditional big brand. I began by discussing the first core feature – technology – I believe you should consider, along with the benefits and potential drawbacks. This week, I’m focused on the second feature – contract terms.
In that moment, I found myself at a crossroads. Facing a perplexed gaze, I turned my back on one of cybersecurity’s most high profile CISOs, my hands pressed firmly against my ears, belting out a powerful melody. I knew it was a crazy act, and perhaps it was unfair of me to subject him to it, but I wanted him to understand a pressing need in cybersecurity.
In recent years, data breaches and compliance failures have made organisations increasingly aware of the need for comprehensive cybersecurity solutions to detect and address threats. However, not all organisations have had the means to invest in and manage the staffing and infrastructure required for a Security Operations Centre (SOC). This is where Managed Detection & Response (MDR) providers come in.
Growing up, most women had a Barbie in their lives at some point. Whether you found her artfully arranged on the toy shelf or covered in ‘dirt’ and tucked away, Barbie has played a significant role in shaping many people’s perceptions and aspirations. In this blog, I’ll be delving into how Barbie continues to influence people, particularly women.
Cybersecurity can often feel like a game of cat and mouse where cyber attackers and defenders engage in a chase, with one party trying to outsmart the other. Just like in previous years, 2024 is set to test practitioners’ skills as the frequency of cyber threats continues to surge leaving no room for complacency. Here are my predictions for 2024. Digital Transformation In 2024, several trends are expected to shape the landscape of digital transformation.
It’s that time of year when I begin to look back and reflect. Then, predict and plan. It’s the way I like to do things. I beleive like Winston Churchill did that the farther backward you look, the farther forward you are likely to see. It’s why I developed the IN Focus journal and planner, which you can buy via Amazon, and works on your life as a whole, not purely you career.
Bob Marley sang, “ Don’t worry about a thing, ’cause every little thing gonna be all right.” This is what I wish I could say to the people where war is ranging. Where they’re caught up in a crossfire. Where innocent civilians are being displaced, separated from their families, hurt, traumatised, or worse still, dying. This brings me to Israel and Gaza.
C-suites across all industries, from traditional finance to the latest “unicorns” emerging in the fintech industry, are facing a formidable challenge: how to protect their business and customer data against growing cyber threats. However, new research from e2e-assure has revealed that few organisations are taking full advantage of security technologies available today.
Data breaches have surged globally this year. By mid-year, there’s been a staggering 156% growth in the total number compared to the previous quarter, with a whopping 855 accounts worldwide being leaked every minute. Sadly, no matter your company size, industry, or geographic location, one thing is clear – these alarming statistics underscore the need for heightened cyber vigilance.
We all know the feeling: ensuring that your business is secure and running efficiently can feel overwhelming. It’s a hard balancing act between protecting valuable data, increasing productivity, controlling costs – especially when technology often seems to be outpacing security measures. But with the range of cloud-based security solutions available today, there doesn’t have to be an underlying fear of losing sensitive information or assets – not with the right solution and partner.
Every now and again I’m asked about conferences and whether they’re worth attending. My answer is always, yes so long as you plan carefully. Over the years I’ve attended hundreds of cybersecurity conferences all over the world, and participated as an attendee, speaker, chair, and advisor. All these roles have enabled me to gain an understanding of conferences through different lenses.
The need for hiring cybersecurity professionals is ever growing. Yet, there remains a hiring problem. Often, when considering this, people immediately turn their attention to educators of Computer Science at schools, colleges, and universities. From analysing research, I believe they’re right to do so. In this blog I’ll be taking a closer look at higher education efforts, specifically for Computer Science at UK universities.
As technology advances and cyberattacks increase, the need for trained professionals to combat them has never been more urgent. Unfortunately, however, there is still a shortage in the cybersecurity workforce, leaving many organisation’s vulnerable to attacks. Today, it’s estimated that 3.4 million cybersecurity professionals worldwide, with 314,000 in the USA alone, are needed to adequately defend against cyber threats.
The tech sector is always dynamic, always changing. But now it’s transforming faster and more unpredictably than ever. Given a whole range of PESTLE factors, IT decision makers (ITDMs) from small businesses to enterprises with managed IT environments are under increasing pressure to make smarter investments with their budgets. This includes everything from productivity and cybersecurity to superior computing experiences for employees, who are increasingly collaborating remotely, multitasking, an
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content