Opinion

Account takeover fraud is not a lottery: lax security allows fraudsters in

Account takeover fraud is not a lottery: lax security allows fraudsters in

Roberto Valerio addresses the latest breach from the National Lottery and analyses how and why this type of fraud is on the rise

Comply to supply - Firms to prove their cyber-credentials or risk losing business

Comply to supply - Firms to prove their cyber-credentials or risk losing business

If cyber-crime wasn't considered a business risk before, it is certainly being pushed to the front and centre stage by large firms now, says Chris Dye who urges adoption of file-regeneration technology.

Never stop learning - the need for a risk-based approach to cyber-security

Never stop learning - the need for a risk-based approach to cyber-security

Kristine Olson-Chapman advises senior executives and IT security professionals on how to manage the challenges of cyber-security by using a risk-based approach

Industrial control systems (ICS) and cyber-risks

Industrial control systems (ICS) and cyber-risks

One of Europe's foremost specialists in securing the technology that controls critical infrastructure, Mark Carolan, believes information security pros should be worried about ICS in their infrastructure.

With GDPR imminent, it's crucial we tackle the biggest myths surrounding data regulation and cyber-security

With GDPR imminent, it's crucial we tackle the biggest myths surrounding data regulation and cyber-security

Lillian Pang addresses some of the most common misconceptions surrounding the new GDPR legislation

Mergers & acquisitions: a lesson in cyber-security complacency and reputational ruin

Mergers & acquisitions: a lesson in cyber-security complacency and reputational ruin

When you undertake an acquisition, cyber-security must be a top integration priority. If left to fester, it will eventually catch you out says Ian Kayne.

Keeping pace with the speeding wheel of change

Keeping pace with the speeding wheel of change

Kevin Davis discusses how vital it is that organisations look to agility as a way of providing speed of change and embracing new technologies to facilitate customer needs

Data manipulation heralds a new era of hacking

Data manipulation heralds a new era of hacking

Jason Hart discusses how data manipulation will be the biggest threat to businesses and public figures in the future.

The new measure of security: visibility

The new measure of security: visibility

Kasey Cross discusses the importance of having the ability to see active attackers on your network at work

Why you should have a DDoS defence

Why you should have a DDoS defence

Duncan Hughes explains the best methods to use to effectively protect businesses and ensure networks can stand up to a DDoS attack

Sign up to our newsletters