Petra Wenham Petra Wenham is a BCS volunteer, with long-standing information security and information assurance experience. Petra Wenham’s Most Recent Content ComputerWeekly.com Public education on security must be a top priority for Labour 27 Aug 2024 ComputerWeekly.com Security Think Tank: To encrypt or not to encrypt, that is the question 28 Sep 2023 ComputerWeekly.com Security Think Tank: To secure code effectively, verify at every step 15 May 2023 ComputerWeekly.com Security Think Tank: Thinking beyond IAM in the cloud 05 May 2023 ComputerWeekly.com Security Think Tank: As cyber pros, we need to articulate our needs better 07 Dec 2022 ComputerWeekly.com Security Think Tank: Anti-ransomware strategies should be as easy as ABC 09 Nov 2022 ComputerWeekly.com Security Think Tank: Good procurement practices pave the way to app security 05 Sep 2022 ComputerWeekly.com Security Think Tank: Basic steps to secure your supply chain 15 Jun 2022 ComputerWeekly.com Security Think Tank: To follow a path, you need a good map 18 May 2022 ComputerWeekly.com National Cyber Strategy misses the mark in one important way 10 Mar 2022 ComputerWeekly.com Security Think Tank: Good documentation could save your bacon 09 Dec 2021 ComputerWeekly.com Security Think Tank: What to find out before investing in SASE 15 Nov 2021 ComputerWeekly.com Security Think Tank: Steps to a solid data privacy practice 26 Aug 2021 ComputerWeekly.com Security Think Tank: ‘Legitimate interest’ crucial for vaccine passports 20 Apr 2021 ComputerWeekly.com Security Think Tank: CNI operators must focus on core issues 17 Mar 2021 ComputerWeekly.com Security Think Tank: Biden must address insider security threat first 12 Feb 2021 ComputerWeekly.com Security Think Tank: Don’t bet on a new normal just yet 11 Jan 2021 ComputerWeekly.com SIEM or SOAR or both? Consider your business complexity first 03 Dec 2020 ComputerWeekly.com Security Think Tank: Tighten data and access controls to stop identity theft 12 Oct 2020 ComputerWeekly.com Security Think Tank: Edge security in the world of Covid-19 17 Sep 2020 ComputerWeekly.com Security Think Tank: SIEM and AI – a match made in heaven? 06 Jul 2020 ComputerWeekly.com Security Think Tank: Container security is evolving, so must CISOs 10 Jun 2020 ComputerWeekly.com Security Think Tank: Security teams are key workers and need support 06 May 2020 ComputerWeekly.com Security Think Tank: A guide to security best practice for pandemics 13 Mar 2020 ComputerWeekly.com Security Think Tank: Practical steps to achieve zero trust 13 Feb 2020 ComputerWeekly.com Security Think Tank: Changing attitudes to cyber is a team sport 09 Jan 2020 ComputerWeekly.com Security Think Tank: In-depth protection is a matter of basic hygiene 03 Dec 2019 ComputerWeekly.com Security Think Tank: Secure the cloud when negotiating contracts 04 Nov 2019 ComputerWeekly.com Security Think Tank: Get basic security policy right, and the rest will follow 08 Oct 2019 ComputerWeekly.com Security Think Tank: Blockchain utility depends on business type and cost 04 Sep 2019 ComputerWeekly.com Security Think Tank: Close interdisciplinary ties are key to security integration 06 Aug 2019 ComputerWeekly.com Security Think Tank: Benefits of GDPR compliance 09 Jul 2019 ComputerWeekly.com Security Think Tank: Top infosec task is getting on board agenda 17 Jun 2019 ComputerWeekly.com Security Think Tank: Understanding tech is key to effective data segregation 15 May 2019 ComputerWeekly.com Security Think Tank: BC/DR plan key to cyber attack survival 09 Apr 2019 ComputerWeekly.com Security Think Tank: Key considerations for determining cyber risk 11 Mar 2019 ComputerWeekly.com Security Think Tank: Many routes to UTM to boost security capabilities 05 Feb 2019 ComputerWeekly.com Security Think Tank: How to use SDN, containers and encryption – and some warnings 11 Jan 2019 ComputerWeekly.com Security Think Tank: Basic steps to countering malware comms 04 Dec 2018 ComputerWeekly.com Security Think Tank: A three-pronged approach to application security 01 Nov 2018 ComputerWeekly.com Security Think Tank: Use Cyber Essentials to kick-start outcomes-based security 04 Oct 2018 ComputerWeekly.com Security Think Tank: Some basic password guidelines 10 Jul 2018 ComputerWeekly.com Security Think Tank: Data controllers are essential in modern business environment 01 Jun 2018 ComputerWeekly.com Security Think Tank: Reducing dwell has never been more important 30 Apr 2018 ComputerWeekly.com Security Think Tank: Patch, scan and lock down to counter fileless malware 13 Mar 2018 ComputerWeekly.com Security Think Tank: Automating basic security tasks 01 Feb 2018 ComputerWeekly.com Security Think Tank: Prism unlikely to change much 05 Jul 2013