Dan Swinhoe

Editor

Dan Swinhoe is UK Editor of CSO Online. Previously he was Senior Staff Writer at IDG Connect.

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.

7 security incidents that cost CISOs their jobs

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity.

Wargaming at Exeter helps keep the university battle ready

Wargaming at Exeter helps keep the university battle ready

Alan Hill of the University of Exeter says more universities need to understand who is targeting them and why to improve cybersecurity defenses and improve incidence response.

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

The new version China’s Multi-Level Protection Scheme (MLPS) expands what companies fall under its purview and lower the threshold for government inspection. Should companies with operations in China be concerned?

UK government gives £36 million to Arm to develop secure chips

UK government gives £36 million to Arm to develop secure chips

The government’s investment is a drop in the ocean for an issue that should be front and center for the semiconductor industry.

UK security budgets rise in face of human and cloud concerns

UK security budgets rise in face of human and cloud concerns

With concerns around cloud migration and human errors, security budgets increasing

Where are UK organisations investing their security budgets?

Where are UK organisations investing their security budgets?

Cloud concerns, automation, and human threats are driving security investments in 2019, suggests a CSO study of organisations in the UK.

Humans are the weak link: Security awareness & education still a challenge for UK companies

Humans are the weak link: Security awareness & education still a challenge for UK companies

A new CSO study of UK organizations suggestions human-centric security is a major priority.

5 ways the FTSE 250 falls down on web security (and 1 where they’re pretty good)

5 ways the FTSE 250 falls down on web security (and 1 where they’re pretty good)

The FTSE 250 is good at keeping internet-facing SMB & Telnet exposure down but has work to do around HTTPS and DMARC.

CSO Online launches in UK

CSO Online launches in UK

Security is a global problem. But geography matters. Whether that’s local compliance regulations, emerging trends around specific or evolving threats, or even geopolitics influencing which groups might target you, where your...

Has the CISO’s standing within the organisation hit a ceiling?

Has the CISO’s standing within the organisation hit a ceiling?

Despite the continuing increase in intrusions and security budgets, the CISO role has seemingly stalled after growing in importance within the organisation in recent years.

Telcos around the world hit by long-term intelligence gathering cyberattack

Telcos around the world hit by long-term intelligence gathering cyberattack

Operation Soft Cell saw telcos around the world lose over 100GB of call record data, but it could have been much worse. Attackers could have shut down cell networks if they wanted.

New TajMahal APT discovered by Kaspersky has one known victim, likely others

New TajMahal APT discovered by Kaspersky has one known victim, likely others

Active since August 2014 with 80 modules able to capture a variety of information but with only one known victim, the TajMahal APT seems too advanced not to be used just once.

Security technologies that provide the most savings

Security technologies that provide the most savings

A new report from Accenture and the Ponemon Institute quantifies which cybersecurity technologies provide the most value to an organization.

APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

Iran-linked hacker group switches techniques from Shamoon wiper attacks to WinRAR exploits.

Ransomware attack drives city to seek greater network visibility

Ransomware attack drives city to seek greater network visibility

After being hit with the Cryptolocker ransomware, the City of Westland realized it needed more insight into network traffic, not just at the perimeter.

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are...

What is spear phishing? Why targeted email attacks are so difficult to stop

What is spear phishing? Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.

What is digital trust? How CSOs can help drive business

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

The state of ICS and IIoT security in 2019

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it.

Load More