Opinion

Securing the contact centre from the inside out

Securing the contact centre from the inside out

Matthew Bryars, CEO of Aeriandi, analyses the threat of insider fraud and what contact centres can do to minimise risk

'The best defence is a good offence' in evolving security, networking market

'The best defence is a good offence' in evolving security, networking market

Dieter Lott discusses the security and networking solutions market and how organisations should be adopting a new proactive approach to security breaches given that IT infrastructure is in a constant state of change.

Teach children to hack ethically to save them from dark side

Teach children to hack ethically to save them from dark side

Teach children to code and, yes, even to hack so they learn about the power and potential perils of the internet, says Nick Banks.

Protecting your assets from the front lines

Protecting your assets from the front lines

Patrick Peterson examines why organisations need to focus on both external and internal assets to address the phishing threat.

Tracking the cyber kill chain: 'spot and block' no longer enough

Tracking the cyber kill chain: 'spot and block' no longer enough

It must be hard as an IT security professional not to feel overwhelmed by the sheer scale and sophistication of the threats facing your organisation, as the language used to describe modern cyber-attacks has become increasingly militaristic.

Living with the enemy

Living with the enemy

Preference for technical solutions, rather than organisational change is resulting in over-investment in stopping cyber-attacks rather than detecting attacks and defending data says James Henry.

Cyber-insurance: no replacement for locks on doors

Cyber-insurance: no replacement for locks on doors

Companies should build a holistic and forward-looking cyber-security programme capable of forecasting potential security threats and alleviating those risks before they cause serious damage says Piyush Pant.

What the next government's cyber-security policy should look like

What the next government's cyber-security policy should look like

The new government needs a new cyber-security policy as a priority - with sufficient resources - and drawn up by people with a good understanding of the issues, says Raimund Genes.

Why Geofencing will become the next endpoint security innovation

Why Geofencing will become the next endpoint security innovation

Geofencing can restrict access to devices or applications while inside a company's perimeter, making it impossible for devices outside the perimeter to access the network explains Roman Foeckl

Cybersecurity requires stealth, patience and resources on a global scale

Cybersecurity requires stealth, patience and resources on a global scale

We must monitor cyber-criminal connections to follow attackers back to their source and have mechanisms − technical or legal − to stop them resuming their activities elsewhere says Neil Campbell.