Opinion

Change management - security vulnerability or scapegoat?

Change management - security vulnerability or scapegoat?

IT security issues continue to hit critical services, but do we, the public, ever know for sure if they are due to error, system failure, or an attack?

How does PCI DSS 3.0 affect you?

How does PCI DSS 3.0 affect you?

Suspicious activity now needs to be monitored in the entire processing chain, hence implementing PCI DSS 3.0 helps stop attacks before compromises occur says Ross Brewer.

Turning the tide on APTs and nation state attackers

Turning the tide on APTs and nation state attackers

Deal with APT intruders logically, not emotionally, and get the upper-hand - even if that means leaving them on the network says Mike Auty,

Are digital loss prevention and signature-based anti-virus living on borrowed time?

Are digital loss prevention and signature-based anti-virus living on borrowed time?

Should fingerprint-based data leakage protection be declared dead asks Peter Tyrrell, suggesting it just doesn't scale for the hyper-connected world.

Ensuring mobile data remains secure

Ensuring mobile data remains secure

Containerisation - separating business and personal data and apps - is an effective way to ensure BYOD doesn't compromise corporate data security says David Brady.

Securing remote Access with token-free authentication

Securing remote Access with token-free authentication

Token-free, multi-factor authentication using mobile phones provides the real-time convenience and flexibility that today's work environment requires says Torben Andersen.

How BYOD and collaboration trends solve corporate incident management

How BYOD and collaboration trends solve corporate incident management

Workforce collaboration via mobile devices and apps is a positive thing, so long as business options are used says Joseph Do.

Smart TVs, wearables and sheep: online and hackable

Smart TVs, wearables and sheep: online and hackable

As the internet of things rolls out into every aspect of our lives, new security issues will arise, and regulators need to ensure minimum standards apply says Geoff Webb.

Software-defined defences - keeping the cyber-risk at bay

Software-defined defences - keeping the cyber-risk at bay

Combatting tomorrow's cyber-security threats with yesterday's flawed technology approach is an unreliable strategy, says John Suffolk.

Lies, damned lies and statistics

Lies, damned lies and statistics

Cyber-crime figures are a dime or dozen but are they really improving your security, asks Ken Munro.