Ron Arden takes a data-centric approach to security where the focus is on protecting the data within a system, and not just the system itself
Paul Donovan outlines the main questions to ask when choosing a NAC solution to work alongside a BYOD policy while protecting the network
email is one of the main routes for delivering malware into the enterprise, but despite frequent reports of its demise, it appears here to stay, so companies had better tailor their security posture accordingly says Carl Leonard.
Andrew Rogoyski says that companies need to identify what is truly their most sensitive, most valuable data - the thing that would most severely impact the company if stolen or compromised.
It's difficult to predict how the global and British economies will react to Brexit in the long run, however UK Cyber-security has every chance of staying in very good shape says Ilia Kolochenko.
Joanna Ward looks at the recent battles between tech providers and law enforcement agencies over encryption and considers how the escalation potentially be avoided.
Itay Glick says that new spear-phishing scams suggest that this method of spreading malware will surely continue to grow
Tony Anscombe asks, which is more secure, the password or biometrics?
The threat of a cyber-attack is a concern for us all, but nothing strikes more fear than ransomware says Mark Kedgley.
Paco Hope asks if black boxes can make our cars and lives less safe instead of safer