Kate O'Flaherty
Kate O'Flaherty is a freelance journalist with well over a decade's experience covering cyber security and privacy for publications including Wired, Forbes, the Guardian, the Observer, Infosecurity Magazine and the Times. Within cyber security and privacy, her specialist areas include critical national infrastructure security, cyber warfare, application security and regulation in the UK and the US amid increasing data collection by big tech firms such as Facebook and Google. You can follow Kate on Twitter.
Latest articles by Kate O'Flaherty
![A digital illustration of a handshake between two businesspeople, with their hands rendered as circuits to represent acquisition risks.](https://cdn.mos.cms.futurecdn.net/MQJug5ikPbyaW4VPDJcQHW-320-80.jpg)
Mitigating cyber risks in mergers and acquisitions
By Kate O'Flaherty published
In-depth Mergers and acquisitions can open the door to significant cyber security gaps, which IT teams must work hard to overcome in the immediate aftermath of any deal closing
![An abstract CGI image of red, blue, white, and purple layers representing an organization's cyber incident response strategy.](https://cdn.mos.cms.futurecdn.net/SziFRufF3tyKcNVPeFHz8K-320-80.jpg)
Building an incident response strategy in 2024
By Kate O'Flaherty published
In-depth As the threat landscape changes, businesses must ensure their incident response strategy is up to the task and ready to meet the needs of regulators and stakeholders
![A CGI render of a chain, formed from blue lines, moving from the top right half of the frame to the bottom left against a dark background. As it extends to the left, it breaks apart into individual blue strands to represent a supply chain.](https://cdn.mos.cms.futurecdn.net/hRV9zUbEM6roDdKfixiEGC-320-80.jpg)
Why the CISO role is so demanding – and how leaders can help
By Kate O'Flaherty published
In-depth Battling decreasing budgets and stressful working patterns, those in the CISO role need support and space to communicate to do their jobs well
![A glowing golden shield, in a shadowy environment to represent stealthy malware.](https://cdn.mos.cms.futurecdn.net/u3S7jDuzCNTCN3RZTa5mcj-320-80.jpg)
Stealthy malware: The threats hiding in plain sight
By Kate O'Flaherty published
In-depth As malicious software becomes increasingly difficult to detect, businesses must act to counter the stealthy malware threat
![A CGI render of glowing blue and purple lines connecting to represent AI threats.](https://cdn.mos.cms.futurecdn.net/fj9R8CirBNKsHxZDSiQz8D-320-80.jpg)
AI threats: The importance of a concrete strategy in fighting novel attacks
By Kate O'Flaherty last updated
In-depth Malicious AI use could accelerate cyber attacks, but how big is the AI threat in practice and what can businesses do to prepare?
![A pixelated world map with red circles to indicate state-sponsored cyber attacks by hacking groups.](https://cdn.mos.cms.futurecdn.net/AUkNwn4shduFJqKnsDWdGN-320-80.jpg)
State-sponsored cyber attacks: The new frontier
By Kate O'Flaherty published
In-depth With a new breed of groups launching state-sponsored cyber attacks against businesses, security teams will have to look beyond the traditional “CRINK” attackers
![Lines of green binary code on a black screen, with zero day written in red in the middle](https://cdn.mos.cms.futurecdn.net/f3bDeBHjcWLjQhewbRstRR-320-80.jpg)
Zero-day exploits: How risky are they for businesses?
By Kate O'Flaherty published
In-depth Zero-day exploits in popular software are a growing risk to all businesses. What can be done to mitigate the danger?
![A digital shield logo on a screen, with code surrounding it to represent a cyber security vendor.](https://cdn.mos.cms.futurecdn.net/Jd3pxZCLYdY6GikcNyQbuT-320-80.jpg)
How to choose the best cyber security vendor for your business
By Kate O'Flaherty published
In-depth What the best cyber security vendor means for you will depend on your needs – and if you require one at all
![A CGI circuitboard, with a multi-colored cloud symbol at the center.](https://cdn.mos.cms.futurecdn.net/HFbiSvrN3m45qzwtKg5VyE-320-80.jpg)
Cloud security for SMBs: Simple steps to stay secure
By Kate O'Flaherty published
In-depth While a lack of budget and resources makes cloud security for SMBs harder, there are steps leaders can take to boost defenses
![Five asterisks progressively fading away to represent the end of passwords. The asterisks are on a pale green background.](https://cdn.mos.cms.futurecdn.net/dGTux2KBas4ecwSzZBZas4-320-80.jpg)
The end of passwords – and how businesses will embrace it
By Kate O'Flaherty published
In-depth What will the end of passwords look like in practice and what can businesses do to prepare?
![A shield on a computer chip to represent vulnerability management and cyber security patches. The shield is colored in rainbow colors, with fine points of light coming out of it to represent the energy flowing through the motherboard.](https://cdn.mos.cms.futurecdn.net/FXNdDnKsrg2pAXN5k4peLE-320-80.jpg)
Patch management: Why firms ignore vulnerabilities at their own risk
By Kate O'Flaherty published
In-depth Despite rising exploits by adversaries, poor patch management is still a problem – what can be done about it?
![A top-down artwork showing businesspeople walking left and right across blocks with binary code on them, to represent the cyber security skills shortage. None of the businesspeople are on paths that will intersect, and as they walk the blocks change from light blue to dark blue.](https://cdn.mos.cms.futurecdn.net/xXqApfaWjb4FwsP7HQiW3o-320-80.jpg)
The cyber security skills shortage: What skills are missing?
By Kate O'Flaherty published
In-depth As the cyber security skills shortage deepens, what specific skills is the industry lacking and how can firms do more with increasingly tight budgets?
![An industrial engineer standing outdoors, his face is lit by the light from a laptop and a power station blurred in the background. He is wearing a hard hat and high-vis jacket over an orange jumper.](https://cdn.mos.cms.futurecdn.net/HEuPZ3MHXKEfCnnXvCLP2j-320-80.jpg)
What are the most-targeted industries for cyber attacks?
By Kate O'Flaherty published
In-depth What makes the most-targeted industries for cyber attacks such common victims, and what can they do to shore up security?
![A CGI render of a metal safe representing ransomware payments, viewed from an isometric angle and placed against a dark grey background resembling a motherboard. At the bottom of the safe, gold pins like on a chip can be seen, and four blue lines of light emanate from each side of the square safe.](https://cdn.mos.cms.futurecdn.net/ELrPPh37SP8EyPNn5MWMYT-320-80.jpg)
The end of ransomware payments: How businesses fit into the fight
By Kate O'Flaherty published
In-depth Governments worldwide have determined to stop ransomware payments, but what does this mean for businesses?
![A 2D graphic depicting a Microsoft Excel spreadsheet. Behind the spreadsheet, a dark green shape with cogs on it can be seen, to represent data analysis. In one corner, a businessman holds an oversized magnifying glass to focus on highlighted cells on the spreadsheet, and in the other corner a block carries math symbols.](https://cdn.mos.cms.futurecdn.net/CYwBvmmqU5ZvgFF5jipEUF-320-80.jpg)
Using Excel for data analysis vs management
By Kate O'Flaherty published
In-depth With many public sector organizations using Excel for data analysis and management, what are the risks and benefits of each approach?
![A CGI representation of passkeys. A key with a biometric thumbprint on the handle is on a blue isometric grid background, surrounded by flying blocks glowing with red light and bearing the images of padlocks, keys, and shields.](https://cdn.mos.cms.futurecdn.net/3oNjFZ7foCoeVsjQUcM3pC-320-80.jpg)
What do passkeys mean for your business?
By Kate O'Flaherty published
In-depth Passkeys are touted as the answer to the password problem. As support is rolled out by the big tech firms, are businesses ready for the technology?
![A black and white hand holding a drawing of a white, square-handled key. Instead of teeth, the key has the number "10110" representing binary code and encryption. The hand and key are set against a solid blue background.](https://cdn.mos.cms.futurecdn.net/M52ds9wEZCmgUf2Bzb8fkM-320-80.png)
Why ransomware attacks happen to small businesses – and how to stop them
By Kate O'Flaherty published
In-depth With a surge in small business ransomware attacks, it's critical to know what makes your organization a target and what defensive measures you can take
![A red warning sign on a backgroud of code, denoting malware and cyber attacks](https://cdn.mos.cms.futurecdn.net/qKCkPsC9o3LPrJHDP6Jkr7-320-80.jpg)
What are Kerberoasting attacks?
By Kate O'Flaherty published
In-depth Kerberoasting attacks are on the rise. How does this attack method work and what can firms do to protect themselves?
![A CGI image of a glowing blue padlock made of energy representing zero trust network security, surrounded with glowing points representing a network.](https://cdn.mos.cms.futurecdn.net/CV7nXZgEmHgLtGLiLHjBgZ-320-80.jpg)
What is zero trust network access (ZTNA)?
By Kate O'Flaherty published
In-depth ZTNA can help protect your business applications and data from cyber attacks
![An CGI render of a white envelope being shot at from all directions by arrows with red-tips, to represent business email compromise (BEC).](https://cdn.mos.cms.futurecdn.net/XwWCccN8DFYGdyRyZj9Eo3-320-80.jpg)
What is business email compromise (BEC)?
By Kate O'Flaherty published
In-Depth Business email compromise (BEC) is surging. What is BEC, why is it growing, and how can firms spot and mitigate attacks?
![A hooded figre standing in front of a digital version of the North Korean flag](https://cdn.mos.cms.futurecdn.net/jcRn6x39ApowgWbrWX2wmA-320-80.jpg)
Should your business worry about North Korean cyber attacks?
By Kate O'Flaherty published
In-depth The threat from North Korea should not be overlooked. What are its aims and how does it stack up against Russia and China?
![Lines of blue computer code next to a blue digital render of a human face](https://cdn.mos.cms.futurecdn.net/fdMyvv7XRnNYS5yNAjWJUA-320-80.jpg)
How AI is changing patch management
By Kate O'Flaherty published
In-depth With the number of vulnerabilities surging, patch management is becoming complex and time-consuming
![Hacker's hand hovering over an illuminated MacBook keyboard - an image denoting hacking](https://cdn.mos.cms.futurecdn.net/y8abhoQWdvEHQQfbBgpqEn-320-80.jpg)
Open source software attacks: Everything you need to look out for
By Kate O'Flaherty published
In-depth Open source software attacks are a growing risk all firms should be aware of, so what can organizations do about them?