Opinion

The concept of Red Teaming

The concept of Red Teaming

An holistic view of security is increasingly important, says Thomas Richards.

The Carphone Warehouse cyber-attack: a wake-up call to UK business

The Carphone Warehouse cyber-attack: a wake-up call to UK business

The Carphone Warehouse cyber-attack shows the potential cost of a cyber-attack but cyber-insurance can help mitigate it, says Simon Gilbert.

Could your user access mismanagement cost you £2m?

Could your user access mismanagement cost you £2m?

Predictive analytics can scrutinise employees' network activities to forestall fraud and other insider threats, says Paul Dyson.

iCloud's two-factor authentication silver lining

iCloud's two-factor authentication silver lining

Last August, a trove of private images leaked online following a series of targeted brute force attacks against celebrity accounts in iCloud, says Silvio Kutic.

Pre-empt the regulations and safeguard your data NOW!

Pre-empt the regulations and safeguard your data NOW!

Take steps now to protect your data ahead of changes to the General Data Protection Regulations in Europe, says Andy Hardy.

Sun, sea and shadow IT

Sun, sea and shadow IT

Chris Mayers provides warnings and advice for firms to help them stay safe as more workers log on when on holiday.

Privileged identities are at the core of today's cyber attacks

Privileged identities are at the core of today's cyber attacks

Given the difficulty of preventing them, we should focus instead on minimising the damage from cyber-attacks, says Philip Lieberman.

Disaster recovery planning - it's not just how but when

Disaster recovery planning - it's not just how but when

The old saying "failing to prepare, is preparing to fail" is never more appropriate than when applied to disaster recovery (DR), says Oscar Arean.

Why IT service management teams must play a key role in cyber resilience

Why IT service management teams must play a key role in cyber resilience

When it comes to information security it's been well documented that everybody has a key role to play in protecting sensitive and valuable information, says Nick Wilding.

Top three network risks for mobile workers and how to counter them

Top three network risks for mobile workers and how to counter them

As more and more business is conducted remotely, users need to adopt solutions that will address security weaknesses inherent in Wi-Fi, says John Knopf.