Opinion

Avoid security breaches during reorganis​ation and mergers

Avoid security breaches during reorganis​ation and mergers

Paul Bonner advises companies merging to take the best security practice from each component company, and not impose the practices of the dominant player - or resistance is likely.

Is your website fit and secure for King Consumer?

Is your website fit and secure for King Consumer?

B2B websites could learn a lot about security from their consumer facing compatriots suggests Bob Tarzey.

Why the cloud wasn't 'Shellshocked' and how to prepare for the next vulnerability

Why the cloud wasn't 'Shellshocked' and how to prepare for the next vulnerability

Companies should reconsider cloud-security perceptions says Pathik Patel, noting that recent software vulnerabilities such as Shellshock had less affect on cloud-based services than premises-based apps.

Establishing habits of a highly effective security professional

Establishing habits of a highly effective security professional

Preparation and organisation can enable effective security for one man SOCs or small teams explains Joe Schreiber.

Information security assurance from a resilience perspective

Information security assurance from a resilience perspective

A holistic approach to information security is needed to overcome the shortcomings of a Risk Management approach says David Stubley.

Major cyber security mistakes and how to avoid them

Major cyber security mistakes and how to avoid them

James Solyom, head of cyber protect and cyber respond at Control Risks, examines how organisations can avoid making expensive mistakes that leave them open to cyber-attack.

How the threat landscape challenges authentication - old and new

How the threat landscape challenges authentication - old and new

The growing cyber-threat landscape poses some awkward questions for present and future authentication methods, argues Barry Scott.

Defending online games from piracy, cheating and fraud

Defending online games from piracy, cheating and fraud

The video games industry generates billions of revenue, but only 20 percent achieve profit, due to cheats breaching security, hence the need for stricter implementation and enforcement of controls says Amit Sethi and Rennie Allen.

Is the Isle of Man the world's crypto-currency capital?

Is the Isle of Man the world's crypto-currency capital?

Regulation and infrastructure from off-shore finance and gaming industries are being leveraged to make the Isle of Man a centre for cypto-currencies says Peter Greenhill.

Out with the old, in with the cloud

Out with the old, in with the cloud

Moving to the cloud is inevitable, but it demands new ways of thinking about data security, and new approaches to secure this new border says Martin Borrett.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more