This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Opinion

Critical National Infrastructure: how to reduce industrial-scale risk

Critical National Infrastructure: how to reduce industrial-scale risk

Nation-state attacks on CNI will be faciliated by the internet of things, and government regulation is needed to set standards, but the actual likelihood of CNI attacks remains very low says Raimund Genes.

Insiders can use whistleblowing tools to steal data without a trail

Insiders can use whistleblowing tools to steal data without a trail

The tools exist to by-pass many data leakage programmes and facilitate mass exfiltration of data, so enable internal whistelblowing - to avoid external access says Edward Parsons.

Know thy neighbour: Dealing with third-party cyber attacks

Know thy neighbour: Dealing with third-party cyber attacks

It's not enough to protect your own network, you also have to be prepared to cope with third party negligence, says Brian Foster.

The dungeon of the 'Deep Web'; where even the spiders dare not travel

The dungeon of the 'Deep Web'; where even the spiders dare not travel

Charles Sweeney asks, are your staff inadvertently leaving the back door open via an innocent lunch-time browse?

Regulatory compliance and risk includes third-parties

Regulatory compliance and risk includes third-parties

Third Party IT services suppliers must reassess governance, risk management and compliance responsibilities.

The need for resilience

The need for resilience

The ability to detect and respond when your security is breached are of paramount importance in ensuring organisational resilience says Alan Calder.

Using spreadsheets to manage risk is risky business

Using spreadsheets to manage risk is risky business

Spreadsheets should be banned from the risk management process as they are no longer up to the job says Keith Ricketts.

Heartbleed (remediation) has improved open source cybersecurity

Heartbleed (remediation) has improved open source cybersecurity

The future of computing infrastructure, mobile applications, and personal data protection has been altered by Heartbleed says Joram Borenstein.

Losing data and facing the ICO

Losing data and facing the ICO

Dated data protection laws, punitive punishments and an inability to classify data are problems for businesses in the age of ever-increasing data breaches, says Martin Sugden.

The top 8 ways that privileged accounts are exploited

The top 8 ways that privileged accounts are exploited

Failure to properly monitor and update privileged access is a key vulnerability and Chris Stoneff highlights the leading weaknesses.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more