Dan Swinhoe

Dan Swinhoe is UK Editor of CSO Online. Previously he was Senior Staff Writer at IDG Connect.

Humans are the weak link: Security awareness & education still a challenge for UK companies

5 ways the FTSE 250 falls down on web security (and 1 where they’re pretty good)

5 ways the FTSE 250 falls down on web security (and 1 where they’re pretty good)

The FTSE 250 is good at keeping internet-facing SMB & Telnet exposure down but has work to do around HTTPS and DMARC.

Has the CISO’s standing within the organisation hit a ceiling?

Has the CISO’s standing within the organisation hit a ceiling?

Despite the continuing increase in intrusions and security budgets, the CISO role has seemingly stalled after growing in importance within the organisation in recent years.

CSO Online launches in UK

CSO Online launches in UK

Security is a global problem. But geography matters. Whether that’s local compliance regulations, emerging trends around specific or evolving threats, or even geopolitics influencing which groups might target you, where your...

The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.23 billion and counting.

Telcos around the world hit by long-term intelligence gathering cyberattack

Telcos around the world hit by long-term intelligence gathering cyberattack

Operation Soft Cell saw telcos around the world lose over 100GB of call record data, but it could have been much worse. Attackers could have shut down cell networks if they wanted.

New TajMahal APT discovered by Kaspersky has one known victim, likely others

New TajMahal APT discovered by Kaspersky has one known victim, likely others

Active since August 2014 with 80 modules able to capture a variety of information but with only one known victim, the TajMahal APT seems too advanced not to be used just once.

Security technologies that provide the most savings

Security technologies that provide the most savings

A new report from Accenture and the Ponemon Institute quantifies which cybersecurity technologies provide the most value to an organization.

APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

Iran-linked hacker group switches techniques from Shamoon wiper attacks to WinRAR exploits.

Ransomware attack drives city to seek greater network visibility

Ransomware attack drives city to seek greater network visibility

After being hit with the Cryptolocker ransomware, the City of Westland realized it needed more insight into network traffic, not just at the perimeter.

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are...

What is spear phishing? Why targeted email attacks are so difficult to stop

What is spear phishing? Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.

Load More