Graham Welch
Graham Welch was for more than ten years Sourcefire's EMEA Managing Director and the company’s first International employee. Following the acquisition of Sourcefire by Cisco in 2013, he now heads up a worldwide team at Cisco tasked with solving the cybersecurity challenges of Cisco's biggest global customers.

Previously Graham was Area Vice President for UK, Ireland, France and Benelux at RSA Security, where he was responsible for nearly 50% of RSA’s EMEA revenues. While at RSA Security, he built the UK business from $5 million per annum to more than $25 million in just 5 years. Prior to joining RSA, Welch also held major account sales and channel positions at technology manufacturer Tektronix Inc. and UK distributor Golden Gate.

Entries by Graham Welch

Toy Hacks: Another Example of Why Security Needs an Overhaul

(0) Comments | Posted 9 December 2015 | (15:53)

As the Internet of Things (IoT) continues to grows, we start to see a new generation of connected devices, including kids' toys and accessories. From baby monitors that allow parents to watch their infants remotely, to smart talking dolls, which connect to a database to answer kids' questions, the same...

Read Post

McFly and Doc Never Saw Cybercrime Coming

(0) Comments | Posted 21 October 2015 | (09:42)

Back to the Future Day has finally arrived: 21st October 2015, the day Marty McFly and Emmett "Doc" Brown arrived in the future, in the sci-fi film from 1989. Some of the technologies imagined back then actually became reality, others not. Ironically, the World Wide Web, the most remarkable of...

Read Post

Attracting Young People to Tech

(0) Comments | Posted 16 September 2015 | (18:52)

It is somewhat surprising to me that given young people's heavy reliance and usage of technology that this discipline continues to be overlooked by many looking ahead for their future careers. Given the opportunities a career in tech gives for a great salary and almost the 'guarantee' of employment, it...

Read Post

Tech Innovation With Security at Heart

(0) Comments | Posted 24 August 2015 | (15:30)

Tech companies are eager to innovate to stay ahead of their competitors and anticipate their customers' needs. However, just as fast as they come up with new software, apps and gadgets, hackers come along to mine their efforts and find a way to take advantage of them for malicious purposes....

Read Post

Beware the All-Knowing App

(0) Comments | Posted 9 July 2015 | (09:59)

Do you ever check what permissions the apps you download to your smartphone or tablet require? Just why is it your torch app needs access to your contact lists and location? Or why your calendar needs to access your phone records?

Never thought about it? Well you are probably...

Read Post

Seven Everyday Cyber Threats to Look Out For

(0) Comments | Posted 18 June 2015 | (15:14)

High-profile cyberattacks against major corporations and governments may be the ones making the headlines these days but cybercriminals are also still exploiting those basic online scamming techniques they have been perfecting for years. As most people are still unaware or not following basic cybersecurity measures, they keep falling victims of...

Read Post

What Happens After a Cyberattack?

(0) Comments | Posted 20 May 2015 | (09:01)

Around this time last year a large online auction website went public to announce they had been breached and millions of customer records were compromised. They were not alone, 2014 was marked by high-profile cyberattacks to high street and online retailers. Immediately after the attack, most companies asked their customers...

Read Post

Love Letter for You

(0) Comments | Posted 5 May 2015 | (09:36)

Don't be fooled by the title: this is not a love story. Fifteen years ago, on 5th May 2000, computer worm "I love you", also known as "love letter", started to spread. The malware disguised as a love email infected approximately 45 million users worldwide. It spread across three continents...

Read Post

Mind the Cyber Gap

(0) Comments | Posted 28 April 2015 | (14:01)

The age of the Internet of Things and the Industrialisation of hacking is transforming all businesses and the way they need to think and behave in a connected world. Further evidence of this was demonstrated again just last week when professional services firm KPMG warned rail firms they...

Read Post

Don't Get Dazzled by the Shiny New Threat

(0) Comments | Posted 16 April 2015 | (14:46)

The recently launched Verizon Data Breach Report 2015 gathered many news headlines because of its bold statement that security threats to your mobile phone are generally "overblown." The report highlights that the total number of security vulnerabilities that have been used for exploits, regardless of platform, is "negligible"...

Read Post

Criminals Shopping for Your Data

(0) Comments | Posted 31 March 2015 | (09:33)

We know that Cybercriminals 'follow the money' and constantly target industries and individuals who can provide them with the most valuable data and information they can utilise to make money. Generating revenue from their nefarious criminal activities is the name of the game for these highly organised and well-resourced criminal...

Read Post

People Remain the Weakest Link in Security

(0) Comments | Posted 6 March 2015 | (08:52)

A new survey unveiled last week by the UK consumer association Which reported the top five email scams to be aware of for 2015.

Anyone who checks their spam folder in their email regularly will not be surprised that bank scams; online payment companies and tax rebates top...

Read Post

A World of Mobile Delights - and Dangers

(1) Comments | Posted 3 March 2015 | (12:20)

As a consumer watching from afar, the announcement of new smartphones and other mobile devices coming out of the annual Mobile World Congress in Barcelona fill me with excitement. After all who can fail to be impressed by the sophistication and capabilities of the newest gadgets and technology...

Read Post

Is It Time for That Spring Cleaning?

(0) Comments | Posted 25 February 2015 | (09:03)

As February speeds to a close and the weather - at least here in the UK - gets a little brighter and the days longer, we start to think about spring and the year ahead.

Spring cleaning is traditionally an activity undertaken as the seasons change in the home. But...

Read Post

Data, data, everywhere...

(0) Comments | Posted 11 February 2015 | (17:12)

It used to be a common sight on the street to see people walking along with their mobile phones clenched to their ears. But increasingly this has changed to the view of people heads down, looking at their mobile phone screens as they watch the latest video craze or play...

Read Post

Prepare for the Festive IT Headache

(0) Comments | Posted 8 December 2014 | (08:40)

The holidays are a time for giving, we all know, and 2014 continues the trend of the past few years - one of the most popular gifts this year will be a new tablet, smartphone or laptop.

While tablet sales are predicted to slow this year, Gartner...

Read Post

Is 2015 the Year for the Threat-centric Network?

(0) Comments | Posted 3 December 2014 | (15:26)

As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.

Read Post

Spycam Hacking Shock

(0) Comments | Posted 21 November 2014 | (13:43)

Much of the UK media was dominated this week by yet another security story - this time the news that thousands of web cameras and even baby monitors around the world had been hacked and their images displayed on a website, allegedly to warn users to set up...

Read Post

Connectivity Everywhere

(0) Comments | Posted 4 November 2014 | (07:09)

Everyone knows that in today's world we have never been so connected. The Internet is a part of most of our lives at work and at play every day. Indeed ask most teenagers and they will consider the Internet as being almost as important as the air that they breathe!

Read Post

100 Mr Big's Control Cybercrime

(0) Comments | Posted 20 October 2014 | (10:06)

Many people will have seen the surprising announcement from Europol's Cybercrime Centre the other week that there are only "around 100" cybercriminal kingpins behind global cybercrime.

While I wouldn't want to speculate on if this number is correct or not, I do agree that such is the industrialisation...

Read Post