All posts in Security leadership
06 Jul, 2023
cybercrime, devops, Hacking, IT, Malware, Naked Security Podcast, podcast, Privacy, secops, Security leadership, Security News, X-Ops
0

by Paul Ducklin PUTTING THE X IN X-OPS First there was DevOps, then SecOps, then DevSecOps. Or should that be SecDevOps? Paul Ducklin talks to Sophos X-Ops insider Matt Holdcroft about how to get all your corporate “Ops” teams working together, with cybersecurity correctness as a guiding light. No audio . . . Read more
04 Jan, 2023
Cryptography, cybercrime, Data loss, Linux, machine learning, Malware, podcast, Security leadership, Security News, Vulnerability
0

Lessons for us all: improve cryptography, fight cybercrime, own your supply chain… and don’t steal my data and then pretend you’re sorry.

The problem with anniversaries is that there’s an almost infinite number of them every day…
29 Dec, 2022
cybercrime, Data loss, Hacking, Malware, mdr, Naked Security Podcast, Peter Mackenzie, podcast, Ransomware, Security leadership, Security News
0

Listen now – you’ll be alarmed, amused and educated, all in equal measure. (Full transcript in article.)
22 Dec, 2022
cybercrime, fraser howard, Malware, podcast, Security leadership, Security News, Security SOS Week, SophosLabs, SOS Week, threat prevention
0

Join world-renowned expert Fraser Howard, Director of Research at SophosLabs, for this fascinating episode on how to fight cybercrime.
24 Nov, 2022
cyberthreats, John Shier, Law & order, mdr, podcast, Security leadership, Security News, security threats, Shier, Threat Report, XDR
0

Latest episode – security expert John Shier explains what the real-life cybercrime stories in the Sophos Threat Report can teach us

Four one-on-one interviews with experts who are passionate about sharing their expertise with the community.

Chester Wisniewski on what we can learn from Uber: “Just because a big company didn’t have the security they should doesn’t mean you can’t.”

Heartfelt encouragement to embrace RFC 3339 – find out why!

Traffic lights make a handy global metaphor for denoting the sensitivity of cybersecurity threat data – three colours that everyone knows.