Opinion

Resilience in the mid-market: Improving incident response capabilities of mid-sized organisations

Resilience in the mid-market: Improving incident response capabilities of mid-sized organisations

In today's cyber-threat landscape, the importance of incident response (IR) as a critical priority is fast gaining traction among the security community says John Bruce.

IoT: Making the case for true interoperability

IoT: Making the case for true interoperability

Cesare Garlati says having a device rendered useless because of a shut down in cloud service highlights the need for open standards in IoT devices.

Healthcare phishing attacks - Is the NHS next and how can it prepare?

Healthcare phishing attacks - Is the NHS next and how can it prepare?

The healthcare sector is vulnerable to cyber-attack, keeping a lot of personal data that attackers are increasingly targetting, and the NHS needs to get its defences in place now says Stuart Robb.

Enterprises are facing rising mobile threats

Enterprises are facing rising mobile threats

Sean Ginevan outlines how attackers are changing their methods to attack the mobile enterprise, and what can be done to shut down vulnerabilities.

To pay or not to pay...

To pay or not to pay...

Andrew Tang explores the contentious issue of paying bug bounties when software flaws are discovered.

Post-breach forensics: Building the trail of evidence

Post-breach forensics: Building the trail of evidence

New approaches to user monitoring and behavioural analytics enable firms to analyse all user activity, allowing tracking and visualising of user activity in real-time to understand what is really happening on the network says Balázs Scheidler.

Security training — luck is all about practice

Security training — luck is all about practice

When it comes to cyber-security, almost half of organisations rely on luck to get them through a cyber-attacks says Bethany Mayer.

How to create an appetite for cyber-security risk management in the organisation

How to create an appetite for cyber-security risk management in the organisation

Poor risk appetite remains a problem for companies, yet cyber-security is one area that needs urgent attention says Stuart Reed.

EU business leaders must act now before new security law takes effect

EU business leaders must act now before new security law takes effect

Jason Hart explains why EU businesses need to evaluate their security practices now before the new law takes effect.

A synchronised approach to security

A synchronised approach to security

Without synchronised security, information system controls don't talk to each other, so can't work together to react to threats says John Shaw, advocating a more joined-up approach to security to defend against attacks.