Check Out All Things

cybersecurity

Time to Ditch Traditional Tools for Cloud Security

Reliance on cloud technologies has significantly expanded the attack...

Cloud security is a shared responsibility

The good news is that increasing numbers of customers...

Next-Generation Ransomware Protection for the Cloud

Have you heard the story of the LockBit gang?...

What You Need to Know about NIS2

The Network and Information Security (NIS) Directive was designed...

Three Reasons Cyberattackers Target the Cloud

Malware, ransomware attacks and sophisticated phishing campaigns are all...

Managing Private Content Exposure Risk in 2024

There is no doubt that managing data privacy and compliance risks becomes increasingly difficult year on year. Cybercriminals continue to evolve their strategies and...

Tackling AI challenges in ethics, data, and collaboration

We can safely say that artificial intelligence (AI) was certainly one of the buzzwords of 2023. Initially developed for sophisticated, enterprise applications that enabled...

The evolution of the CISO

What began as a technical innovation on the hacker side ends up as a decisive impetus for CISOs to further develop their role in...

Building cyber resilience across the supply chain

While the world is becoming increasingly interconnected and digitised, globalised economies rely on robust and resilient supply chains. However, this digitisation exposes businesses to...

Why is Cloud security failing to keep pace?

The cloud is now a significant attack surface for most organisations, with 80% of exposures deemed medium, high or critical associated with assets housed...

CIF Presents TWF – Evan Lever

In this episode of our weekly interview show, TWF! - Tech Wave Forum, host and CIF CEO David Terrar will interview our member Escrow...

Battle-Ready Cybersecurity: Top 4 Tactics to Empower Teams Against Cyber Attacks

Security teams don’t need to spend wildly to combat the growing danger from cyber attacks.

Want to improve your cybersecurity posture?

The UK’s Cyber Security Breaches Survey released earlier this year estimated that approximately 2.9 million cases of cyber crime affected UK businesses over a...

CIF Presents TWF – Miguel Clarke

In this ninth episode of our weekly news and interview show, Tech Wave Forum, host and CIF CEO David Terrar, will discuss his take...

Supplementing CNAPP: Why APIs and cloud apps need additional API security

For API application protection, organisations need to focus on implementing security solutions that understand how APIs are built, deployed, and exploited and how this can unnecessarily expose applications.

Subscribe to our Newsletter