For the next interview in our series, we were delighted to catch up with Lee Whatford to discuss the key skills a CISO needs in 2022, tips for successfully managing relationships with the board and how to keep your security function agile!
In this blog, Ben Shaw explores SQL Injection, a security vulnerability which allows an attacker to inject malicious commands into legitimate database queries. He explores exploitation, prevention and what it means for your business in the real world.
For our first interview, we were really excited to catch up with Rob Forster for a fascinating discussion about how psychology led to a career in security, key priorities in 2022, and top tips around phishing and security awareness.
In this webinar, our panel of experts from Intelliflo, SANS and Secure Impact discussed the SI offensive cyber maturity model, and how can it be leveraged to improve your cyber maturity and overall security posture.
In this blog, Alice Conibere discusses the importance of good password security practices, as well as how to check whether your password has been included in a breach.