In today's cyber-threat landscape, the importance of incident response (IR) as a critical priority is fast gaining traction among the security community says John Bruce.
Cesare Garlati says having a device rendered useless because of a shut down in cloud service highlights the need for open standards in IoT devices.
The healthcare sector is vulnerable to cyber-attack, keeping a lot of personal data that attackers are increasingly targetting, and the NHS needs to get its defences in place now says Stuart Robb.
Sean Ginevan outlines how attackers are changing their methods to attack the mobile enterprise, and what can be done to shut down vulnerabilities.
Andrew Tang explores the contentious issue of paying bug bounties when software flaws are discovered.
New approaches to user monitoring and behavioural analytics enable firms to analyse all user activity, allowing tracking and visualising of user activity in real-time to understand what is really happening on the network says Balázs Scheidler.
When it comes to cyber-security, almost half of organisations rely on luck to get them through a cyber-attacks says Bethany Mayer.
Poor risk appetite remains a problem for companies, yet cyber-security is one area that needs urgent attention says Stuart Reed.
Jason Hart explains why EU businesses need to evaluate their security practices now before the new law takes effect.
Without synchronised security, information system controls don't talk to each other, so can't work together to react to threats says John Shaw, advocating a more joined-up approach to security to defend against attacks.