Opinion

A data revolution in the Fourth Industrial Revolution

A data revolution in the Fourth Industrial Revolution

Today, as the Fourth Industrial Revolution (Industry 4.0) gathers pace, all areas of industry are experiencing new technological changes at a speed, scale and force unlike anything we have ever seen before says Paul Appleby.

Why passwords will never die

Why passwords will never die

Fundamental issues with the nature of security mean that passwords aren't going anywhere for the foreseeable future says Bill Carey who sees their role remaining as part of multi-factor solutions.

Five cyber-security trends to watch

Five cyber-security trends to watch

Dr Adrian Davis shares his top EMEA technology and security trends to watch this year including changing consumer expectations of data use and privacy as its value becomes apparent.

Into the Mind of a RAT operator

Into the Mind of a RAT operator

Both Dyre and Dridex Trojans now use a combination of local redirection and RAT to effectively escape detection by current anti-fraud and security tools, but Uri Rivner says real-time behaviour analysis can still spot the bad guys.

Video: Building blocks of IT security 1 - Establishing the requirement

Video: Building blocks of IT security 1 - Establishing the requirement

In instalment one of his four-part viewpoint series, Tony Collings outlines the first of his essential building blocks for the successful implementation of an IT project: have you got the business requirement right?

Four key predictions for enterprise security in 2016

Four key predictions for enterprise security in 2016

The threats faced and intelligence needed in enterprise security is always changing and the organisations that stay on top of these trends will be best placed to handle whatever comes their way says Mark Hughes.

Secure Shell (SSH) the key to the post-password world

Secure Shell (SSH) the key to the post-password world

The humble password is often seen as obsolete and ineffective. David Howell suggests that Secure Shell (SSH) key technology has several key advantages and can help to deliver the post-password world.

Security in the age of network virtualisation

Security in the age of network virtualisation

Many enterprise CIOs are learning how Software Defined Networking (SDN) and Network Function Virtualisation (NFV) can bring about business transformation as well as IT efficiencies says Craig D'Abreo.

Three things real-time DNS analysis can reveal about cyber-attacks and vulnerabilities

Three things real-time DNS analysis can reveal about cyber-attacks and vulnerabilities

New tools are making real time data analysis and exploration of DNS traffic possible. This is turning previously ignored data into a source of valuable insight says Chris Griffiths.

TalkTalk's cyber-security lesson

TalkTalk's cyber-security lesson

The TalkTalk breach was not an isolated incident says Clayton Locke who advises companies on the need to monitor user-behaviour for inconsistencies.