Check Out All Things

cybersecurity

Tackling AI’s Data Sovereignty Dilemma

With the advent of ever stricter data privacy and...

Distinguishing Real AI in Cybersecurity

The term ‘artificial intelligence’ can be broadly described as...

Three Ways to Strengthen API Security

APIs (Application Programming Interfaces) are a critical driver of...

The importance of channel partners in driving forward Zero Trust

Once coined a ‘buzzword’, there has been a positive...

Time to Ditch Traditional Tools for Cloud Security

Reliance on cloud technologies has significantly expanded the attack...

Cloud security is a shared responsibility

The good news is that increasing numbers of customers are moving to the cloud to take advantage of all the benefits it provides, including...

Next-Generation Ransomware Protection for the Cloud

Have you heard the story of the LockBit gang? If not, consider yourself lucky. The LockBit gang is known for its widespread ransomware attacks...

What You Need to Know about NIS2

The Network and Information Security (NIS) Directive was designed to strengthen cybersecurity in organisations across European Union (EU) states. That directive is now being...

Three Reasons Cyberattackers Target the Cloud

Malware, ransomware attacks and sophisticated phishing campaigns are all serious problems across cloud, on-prem or hybrid environments. Our reliance on the cloud in particular...

Managing Private Content Exposure Risk in 2024

There is no doubt that managing data privacy and compliance risks becomes increasingly difficult year on year. Cybercriminals continue to evolve their strategies and...

Tackling AI challenges in ethics, data, and collaboration

We can safely say that artificial intelligence (AI) was certainly one of the buzzwords of 2023. Initially developed for sophisticated, enterprise applications that enabled...

The evolution of the CISO

What began as a technical innovation on the hacker side ends up as a decisive impetus for CISOs to further develop their role in...

Building cyber resilience across the supply chain

While the world is becoming increasingly interconnected and digitised, globalised economies rely on robust and resilient supply chains. However, this digitisation exposes businesses to...

Why is Cloud security failing to keep pace?

The cloud is now a significant attack surface for most organisations, with 80% of exposures deemed medium, high or critical associated with assets housed...

CIF Presents TWF – Evan Lever

In this episode of our weekly interview show, TWF! - Tech Wave Forum, host and CIF CEO David Terrar will interview our member Escrow...

Subscribe to our Newsletter