Guarding against the next cyber attack

Guarding against the next cyber attack

Up next

Tech in 2026: Inside the AI bubble

Is 2026 the year that AI hype meets reality? In a new mini-series from Tech Tonic, the FT’s tech editor Murad Ahmed speaks with the paper’s reporters about what they'll be watching.Do tech industry insiders think the huge amounts of capital that have driven the AI boom will conti ...  Show more

Untold: Toxic Legacy, Ep. 1

Laura Hughes receives a tip that horses are dropping dead in Wales. As she investigates, she finds decades of academic studies researching the problem. She learns these aren’t isolated incidents. Something is spreading across the countryside. It’s undetectable to humans, nobody k ...  Show more

Recommended Episodes

Hacker conspiracies
Cyber Hacker

The rise of cyber-crime and technology brings with it false information and fear mongering. Reformed Hacker Bastien Treptel and Chief Cyber Risk Officer Fergus Brooks teach us what information we should adhere to and what stories have been created to drive us into the arms of cli ...  Show more

Cyber Hacker - trailer
Cyber Hacker

Reformed Hacker Bastien Treptel and the Team at CTRL Group take us through managing our cyber risks and security in an age where cyber-attacks can be carried out with ease. Detailing risks in the Start-Up, SME industries and cloud services as well as giving us an insight into how ...  Show more

Cyber attack hits global businesses
FT News in Focus

The latest hacking appears smaller in scale than WannaCry but has companies asking themselves whether they did enough to upgrade their security after the first breach, the FT's Sam Jones and Aliya Ram tell Siona Jenkins. Hosted on Acast. See acast.com/privacy for more information ...  Show more

Preparing for the inevitable cyber incident
Cyber Hacker

Preparation is key to prevention. But how do we prepare in an age when technology is always moving so fast? Reformed Hacker Bastien Treptel and Chief Cyber Risk Officer Fergus Brooks give you an understanding of cyber incident readiness and what is involved, such as staff respons ...  Show more