Public-private partnerships in cyber-security are needed with governments helping protect their private sector from cyber-espionage - as demonstrated in Finland and Israel
Time to set the record straight on email authentication: DMARC won't get spam into the inbox, says Rob Holmes
Building a database security strategy is the first step for a company in ensuring security has been addressed inside out says Alan Hartwell.
A new approach to mobile user protection should focus on self-defending apps that provide an integrated, dedicated and secure solution to cyber-crime threats suggests Tom Lysemose Hansen
We need to see all results of government initiatives - both positive and negative - if industry, and especially SMEs are to act on them says Alan Carter.
Too many false positives inevitably reduce response times - and even response numbers - so raise the verification bar and thereby limit them says Chandra Sekar.
In the wake of successful cyber-attacks, and security incidents taking down some of the biggest brands on the planet, impacting critical infrastructure and banking systems alike, it may be asserted that, when it comes to technology, by evidenced implication, it would seem to be exposed, fragile and vulnerable.
Targeted emails with infected attachments are the hacker's weapon of choice but there are ways to avoid being spiked by spear phishing says Noam Green.
Few understand the value of their website to hackers says Ilia Kolochenko, warning that even an individual blog is potentially at risk.
A prison escape with a fake release note, from a fake website, set up via mobile phone, demonstrates yet again that people are our biggest security vulnerability says Fotis Gagadis.