Join us for our executive education programmes in collaboration with Cambridge Judge Business School

Register to attend
Zerto Trust Adoption

11.2022 . Spotlight

Zero Trust Adoption Report

Companies are making progress in their zero trust journey, but many are less protected than they believe they are - and others face major barriers to adopting the technology. What are those?


Zero Trust v2

11.2022 . Spotlight

Why Enterprises Are Getting Zero Trust Wrong

Companies on their journey to Zero Trust adoption admit they lack the capabilities to authenticate users and devices on an ongoing basis, or struggle to monitor users post-implementation. Even those companies that claim to have successfully completed their adoption of Zero Trust admit they haven’t finished implementing zero trust fully across all security risk areas and components. What’s going wrong?

iphone password

10.2022 . Spotlight

Apple Just Killed the Password—for Real This Time

Could passwords soon become obsolete? In a move sure to be welcomed by anyone who struggles to think beyond the easily guessable ‘1234’ or ‘qwerty’, Apple is finally launching passwordless logins across its devices.

BY Dr. Manuel Hepfer

XXX
Retina

10.2022 . Spotlight

Passwords Are Terrible, but Will Biometrics Be Any Better?

Forgetting a password, resetting it, and then having to think up yet another unique string of characters is an experience we all know too well.

BY Dr. Manuel Hepfer

XXX

postitpassword

10.2022 . Spotlight

The State of Passwordless Security 2022

It only took one employee’s stolen password to trigger the Colonial Pipeline ransomware attack last year, disrupting fuel supplies to the southeastern US.

BY Dr. Manuel Hepfer

XXX
Uber Breach

09.2022 . Spotlight

Uber’s Ex-Security Chief Faces Landmark Trial

This question surrounds a current court trial - the first in history where an executive faces criminal charges concerning a data breach.

Employees Defense

09.2022 . Spotlight

Your Employees Are Your Best Defence Against Cyber Attacks

Most security breaches can be traced back to human error, with scammers and social engineers able to exploit our good faith and momentary inattention. This article outlines tactics leaders can use to lessen these human-centred security breaches and motivate staff to stay alert, based on principles in psychology.


Get our monthly newsletter, Spotlight, delivered to your inbox.