For the next interview in our series, we were delighted to catch up with Lee Whatford to discuss the key skills a CISO needs in 2022, tips for successfully managing relationships with the board and how to keep your security function agile!
In this blog, Ben Shaw explores SQL Injection, a security vulnerability which allows an attacker to inject malicious commands into legitimate database queries. He explores exploitation, prevention and what it means for your business in the real world.
For our first interview, we were really excited to catch up with Rob Forster for a fascinating discussion about how psychology led to a career in security, key priorities in 2022, and top tips around phishing and security awareness.
Almost every business will agree that building and maintaining a healthy culture, within all areas of the organisation, is important, and central to that is putting your people at the heart of any structures and policies. When it comes to a businesses’ cyber security posture there is an almost universal tendency to focus almost exclusively on the tools and technologies, overlooking one of the most critical aspects – the needs of people and how they really operate within the business.