IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Kate O'Flaherty

Kate O'Flaherty is a freelance journalist with well over a decade's experience covering cyber security and privacy for publications including Wired, Forbes, the Guardian, the Observer, Infosecurity Magazine and the Times. Within cyber security and privacy, her specialist areas include critical national infrastructure security, cyber warfare, application security and regulation in the UK and the US amid increasing data collection by big tech firms such as Facebook and Google. You can follow Kate on Twitter.

What are privacy-enhancing technologies (PETs)?
A graphic of a padlock in a digital blue colour, with effects
privacy

What are privacy-enhancing technologies (PETs)?

As businesses need to consider privacy now more than ever, privacy-enhancing technologies (PETs) are gaining traction
12 Jan 2023
Why is cyber security's sexual harassment problem so rife?
A woman sitting by her desk at her workplace alone, head in hands
Careers & training

Why is cyber security's sexual harassment problem so rife?

From physical assault to unsolicited explicit images, women in the industry face a barrage of inappropriate behaviour and find little support from emp…
9 Jan 2023
The scariest cyber security horror stories of 2022
An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability
cyber security

The scariest cyber security horror stories of 2022

Lapsus$ group, Log4Shell, new Microsoft Exchange vulnerabilities, and the Russia-Ukraine war dominated cyber security headlines in 2022
22 Dec 2022
How to use machine learning and AI in cyber security
A white robotic hand holding a lock in front of a yellow background
Security

How to use machine learning and AI in cyber security

New technologies can augment your security team's response and may even be able to actively deceive attackers
18 Oct 2022
How will 6G transform the workplace?
Silhouette of somebody holding a smartphone against a background with 6G written onto it
Network & Internet

How will 6G transform the workplace?

The next generation of network connectivity could supercharge the metaverse, boost productivity, and render the smartphone obsolete
11 Oct 2022
Should your business worry about Chinese cyber attacks?
A cyber criminal with the Chinese flag reflected in his glasses
cyber warfare

Should your business worry about Chinese cyber attacks?

State-backed hackers are upping the anti, with businesses on high alert over the potential for falling victim to cyber espionage and IP theft
10 Aug 2022
The new wave of cyber security threats facing critical national infrastructure (CNI)
Power lines with a computerized grid surrounding them
cyber security

The new wave of cyber security threats facing critical national infrastructure (CNI)

CNI is increasingly becoming a viable target, thanks to a litany of new malware strains, with cyber attacks threatening to have serious consequences
8 Jul 2022
Should your business worry about Russian cyber attacks?
Russian hacking on a laptop mockup with code sprawling over the screen
cyber warfare

Should your business worry about Russian cyber attacks?

What is the real Russian cyber security threat facing UK businesses, and how can organisations protect themselves?
7 Apr 2022
What is cloud ransomware and how can you avoid attacks?
Serverless cloud
Cloud

What is cloud ransomware and how can you avoid attacks?

With ransomware increasingly targeting cloud applications and data, as well as cloud-based companies, we explain how you can protect your business
25 Mar 2022
Rebooting your BYOD strategy
A laptop, phone, watch and notepad all organised neatly on a desk
BYOD

Rebooting your BYOD strategy

With hybrid working becoming the norm, there's a need for a device management overhaul. What does BYOD 2.0 look like?
10 Feb 2022
The UK's IoT proposals are riddled with ‘astonishing’ gaps
Image of small robots connected to represent a botnet
Internet of Things (IoT)

The UK's IoT proposals are riddled with ‘astonishing’ gaps

The Product Security and Telecommunications Infrastructure (PTSI) Bill aims to address the connected devices security nightmare, but experts agree it …
19 Jan 2022
The risks and strategies of using privacy as a business differentiator
Faces in binary code to represent privacy
privacy

The risks and strategies of using privacy as a business differentiator

With privacy increasingly driving customer decisions, here’s how to make it a differentiator for your business
13 Dec 2021