Greg van der Gaast is a pioneering cybersecurity speaker and thought leader known for his unconventional journey from infamous hacker to global security executive. With decades of experience spanning technical operations, leadership, and strategy, Greg challenges outdated security norms and advocates for business-aligned, human-centric approaches to cyber defence. We spoke with Greg to explore the […]
Brian Wagner is at the forefront of shaping how businesses defend against modern cyber threats. A renowned cybersecurity speaker and industry leader, he has served as head of compliance for AWS Financial Services and now leads as CTO at cybersecurity firm Defence.com. Throughout his career, including key roles at Cisco, AWS and Bulletproof, Brian has […]
Rob Vann, chief solutions officer at Cyberfort, explains how AI is fundamentally changing the threat landscape for cloud environments. How is AI fundamentally changing the threat landscape for cloud environments? This is an interesting question as, of course, AI is a tool that is useful to both good and bad actors. For now, let’s assume […]
Major-General Jonathan Shaw’s expertise in cybersecurity and defence strategy has shaped the future of national security. The cybersecurity keynote speaker was the first Head of the Defence Cyber Security Programme at the UK Ministry of Defence, pioneering modern cyber defence initiatives. We spoke to Jonathan to explore how organisations can strengthen their cybersecurity, navigate evolving […]
Steatite designs, manufactures, and supplies highly reliable technology for use in harsh conditions, where failure is not an option. Operating in both the US and the UK, Steatite caters to a wide range of customers, from SMEs and government organisations to large multinationals. The problem: The company’s legacy system, a highly customised on-premises ERP, was becoming […]
As organisations increasingly migrate to the cloud, securing sensitive data has never been more critical. While cloud computing offers flexibility and scalability, it also opens the door to a range of security risks. From simple misconfigurations to complex insider threats, cloud security breaches have cost companies huge sums of money and compromised millions of users’ […]
Sarah Armstrong-Smith has built a career on risk management, resilience, and staying ahead of evolving cyber threats. As a leading cybersecurity speaker and chief security adviser at Microsoft Europe, she has spent more than two decades helping businesses navigate digital transformation while strengthening their security posture. We spoke with Sarah to explore the biggest cybersecurity […]
The EU’s Digital Operational Resilience Act (DORA) regulation came into full effect on January 17, 2025, two years after its official adoption. The regulation aims to strengthen the resilience of the financial sector against various digital risks, including cyber threats and technology failures. It establishes a comprehensive framework that requires financial institutions to put in […]
Researchers from ETH Zurich have uncovered significant security vulnerabilities in several widely used end-to-end encrypted (E2EE) cloud storage services. The cryptographic flaws could allow attackers to bypass encryption, compromise file confidentiality, tamper with data, or even inject unauthorised files into users’ storage. The study analysed five E2EE cloud storage providers—Sync, pCloud, Seafile, Icedrive, and Tresorit—which… Read more »
NordVPN has integrated post-quantum cryptography into its Linux application, marking an early adoption of this technology in the consumer VPN market. This move addresses growing concerns about the potential for future quantum computers to break current encryption standards, potentially compromising sensitive data. The update, released in late September, introduces post-quantum cryptography to NordVPN’s Nordlynx protocol.… Read more »