Kate O'Flaherty
Kate O'Flaherty is a freelance journalist with well over a decade's experience covering cyber security and privacy for publications including Wired, Forbes, the Guardian, the Observer, Infosecurity Magazine and the Times. Within cyber security and privacy, her specialist areas include critical national infrastructure security, cyber warfare, application security and regulation in the UK and the US amid increasing data collection by big tech firms such as Facebook and Google. You can follow Kate on Twitter.
Latest articles by Kate O'Flaherty
![](https://cdn.mos.cms.futurecdn.net/QX2iVwGXSoqdgmhNkLEveC-320-80.jpg)
Four measures SMBs can take to avoid common security pitfalls
By Kate O'Flaherty published
In-depth Security can be challenging for SMBs, but it’s possible to make yourself more resilient to reduce the impact of cyber attacks
![Hacker's hand hovering over an illuminated MacBook keyboard - an image denoting hacking](https://cdn.mos.cms.futurecdn.net/y8abhoQWdvEHQQfbBgpqEn-320-80.jpg)
Should your business start a bug bounty program?
By Kate O'Flaherty published
In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
![An abstract image showing a red digital cloud on a dark red background](https://cdn.mos.cms.futurecdn.net/MA3K2XpXbK362B7DGtav8T-320-80.jpg)
What is cloud ransomware and how can you avoid attacks?
By Kate O'Flaherty last updated
In-depth With cloud ransomware increasingly targeting applications and data, as well as cloud-based companies, we explain how you can protect your business
![A digital brain coloured in red](https://cdn.mos.cms.futurecdn.net/U4MhnPA9zTWxjpZqWccBeS-320-80.jpg)
Six generative AI cyber security threats and how to mitigate them
By Kate O'Flaherty published
In-depth What are the risks posed by generative AI and how can businesses protect themselves?
![The UN flag image on a blue stone wall](https://cdn.mos.cms.futurecdn.net/u6rPGTMkN79GsQWTxnGioe-320-80.jpg)
The UN's cyber crime treaty could be a privacy disaster
By Kate O'Flaherty published
In-depth Although a UN committee is fleshing out a new international cyber crime treaty, experts question whether it’ll make any positive difference to businesses
![A digital padlock representing security](https://cdn.mos.cms.futurecdn.net/af53UK7ndNRt5YMTfDgiMZ-320-80.jpg)
How IT professionals can get into cyber security
By Kate O'Flaherty published
In-depth The widely known cyber security skills gap might tempt IT professionals into a career change, but what’s the best way to navigate this switch?
![A graphic of a padlock in a digital blue colour, with effects](https://cdn.mos.cms.futurecdn.net/thCdknGN4MYKQvwnRS6v5Z-320-80.jpg)
What are privacy-enhancing technologies (PETs)?
By Kate O'Flaherty published
In-depth As businesses need to consider privacy now more than ever, privacy-enhancing technologies (PETs) are gaining traction
![A woman sitting by her desk at her workplace alone, head in hands](https://cdn.mos.cms.futurecdn.net/Zj3XETBGUAPo43mq5NrQQJ-320-80.jpg)
Why is cyber security's sexual harassment problem so rife?
By Kate O'Flaherty published
In-depth From physical assault to unsolicited explicit images, women in the industry face a barrage of inappropriate behaviour and find little support from employers
![An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability](https://cdn.mos.cms.futurecdn.net/rcgqGm2k9qbr9K4kHhEmvU-320-80.jpg)
The scariest cyber security horror stories of 2022
By Kate O'Flaherty published
In-depth Lapsus$ group, Log4Shell, new Microsoft Exchange vulnerabilities, and the Russia-Ukraine war dominated cyber security headlines in 2022
![A white robotic hand holding a lock in front of a yellow background](https://cdn.mos.cms.futurecdn.net/LoBrXsZHUNaZt3WSBhzJ6P-320-80.png)
How to use machine learning and AI in cyber security
By Kate O'Flaherty last updated
In-depth New technologies can augment your security team's response and may even be able to actively deceive attackers
![Silhouette of somebody holding a smartphone against a background with 6G written onto it](https://cdn.mos.cms.futurecdn.net/XbhQ2ohYpFYNkXGGH4f4J-320-80.jpg)
How will 6G transform the workplace?
By Kate O'Flaherty published
In-depth The next generation of network connectivity could supercharge the metaverse, boost productivity, and render the smartphone obsolete
![A cyber criminal with the Chinese flag reflected in their glasses](https://cdn.mos.cms.futurecdn.net/DNUm8bqFQH42ek4TXuoGcU-320-80.jpg)
Should your business worry about Chinese cyber attacks?
By Kate O'Flaherty published
In-depth State-backed hackers are upping the anti, with businesses on high alert over the potential for falling victim to cyber espionage and IP theft
![Power lines with a computerized grid surrounding them](https://cdn.mos.cms.futurecdn.net/Kxm9QyEPaCz2EriziivL6X-320-80.jpg)
The new wave of cyber security threats facing critical national infrastructure (CNI)
By Kate O'Flaherty published
In-depth CNI is increasingly becoming a viable target, thanks to a litany of new malware strains, with cyber attacks threatening to have serious consequences
![Russian hacking on a laptop mockup with code sprawling over the screen](https://cdn.mos.cms.futurecdn.net/tkKB3q5gtsyADQHcoXjLSa-320-80.jpg)
Should your business worry about Russian cyber attacks?
By Kate O'Flaherty published
In-depth What is the real Russian cyber security threat facing UK businesses, and how can organisations protect themselves?
![A laptop, phone, watch and notepad all organised neatly on a desk](https://cdn.mos.cms.futurecdn.net/LvA9rNMAfJFSAVaqQLULRH-320-80.jpg)
Rebooting your BYOD strategy
By Kate O'Flaherty published
In-depth With hybrid working becoming the norm, there's a need for a device management overhaul. What does BYOD 2.0 look like?