Opinion

Governments need to protect industry from cyber-espionage - and some do

Governments need to protect industry from cyber-espionage - and some do

Public-private partnerships in cyber-security are needed with governments helping protect their private sector from cyber-espionage - as demonstrated in Finland and Israel

Attention, criminals: DMARC will not get your spam delivered

Attention, criminals: DMARC will not get your spam delivered

Time to set the record straight on email authentication: DMARC won't get spam into the inbox, says Rob Holmes

Securing data where it matters most

Securing data where it matters most

Building a database security strategy is the first step for a company in ensuring security has been addressed inside out says Alan Hartwell.

Fingerprint technology far from foolproof for banking apps

Fingerprint technology far from foolproof for banking apps

A new approach to mobile user protection should focus on self-defending apps that provide an integrated, dedicated and secure solution to cyber-crime threats suggests Tom Lysemose Hansen

Government security initiatives: is the message getting through?

Government security initiatives: is the message getting through?

We need to see all results of government initiatives - both positive and negative - if industry, and especially SMEs are to act on them says Alan Carter.

Alert fatigue: When your security system cries 'wolf.'

Alert fatigue: When your security system cries 'wolf.'

Too many false positives inevitably reduce response times - and even response numbers - so raise the verification bar and thereby limit them says Chandra Sekar.

Organisations are compromised - time to Respond!

Organisations are compromised - time to Respond!

In the wake of successful cyber-attacks, and security incidents taking down some of the biggest brands on the planet, impacting critical infrastructure and banking systems alike, it may be asserted that, when it comes to technology, by evidenced implication, it would seem to be exposed, fragile and vulnerable.

Spear Phishing: Extracting the sting from infected documents

Spear Phishing: Extracting the sting from infected documents

Targeted emails with infected attachments are the hacker's weapon of choice but there are ways to avoid being spiked by spear phishing says Noam Green.

You think you've nothing to steal? Hackers don't agree.

You think you've nothing to steal? Hackers don't agree.

Few understand the value of their website to hackers says Ilia Kolochenko, warning that even an individual blog is potentially at risk.

Prison escape via mobile phone highlights social engineering vulnerability

Prison escape via mobile phone highlights social engineering vulnerability

A prison escape with a fake release note, from a fake website, set up via mobile phone, demonstrates yet again that people are our biggest security vulnerability says Fotis Gagadis.