Opinion

Reminding the cyber-criminals you're king of the castle

Reminding the cyber-criminals you're king of the castle

CISOs and CSOs need to ensure that their staff are aware of and able to tackle all the threats they face, and know how to deploy the most appropriate technology at their disposal says Kalyan Kumar.

Why Cameron's encryption plans would take the UK back to the Dark Ages

Why Cameron's encryption plans would take the UK back to the Dark Ages

Encryption will be used by the bad guys, and so will any back-doors, regardless of legislative bans which would only hit UK business - except its so unworkable it won't happen says Raimund Genes.

Beginning of the end for IT departments

Beginning of the end for IT departments

The emergence of services such as cloud computing, data analysis, social business and mobility has brought corporate IT to what market research company IDC has dubbed the "third platform". But Wieland Alge asks, what will the third platform mean for the CIO role?

Cool in a crisis

Cool in a crisis

Learn from the misfortunes of your peers and prepare to defend against repeat use of the same cyber-attack techniques as part of your defence planning advises David Stubley.

The end of penetration testing in sight?

The end of penetration testing in sight?

With the attack surface, or perimeter, expanding exponentially, and attackers inside the network, the focus should now be on finding and stoping them - concentrating on how data leaves the system - says Chris Marrison.

Trust, company culture and BYOD security

Trust, company culture and BYOD security

Mobile Application Management, with secure access and separation of work and personal use can establish employee trust in a company's BYOD policy says Alan Hartwell.

The reality of data loss - and how to mitigate it

The reality of data loss - and how to mitigate it

Vast volumes of data are travelling to work and back each day stored on employee devices, but in many cases even the most basic protection policies are not in place explains Kelly Brown.

Lessons from the Sony breach: Four things that need to happen now

Lessons from the Sony breach: Four things that need to happen now

We don't have the levels of government protection from a cyber-attack that we would have if armed men attacked, so we need to make our own plans says Eddie Schwartz.

Three stages for securing the personal cloud

Three stages for securing the personal cloud

The personal cloud can be managed in three easy steps and secure the apps that employees are going to use regardless of policy, says Ojas Rege.

In defence of the humble password

In defence of the humble password

The problem with passwords, is users says Francois Amigorena, and overcoming user-error can make passwords fit for purpose once again.