This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Opinion

Winning strategies in cyber warfare

Winning strategies in cyber warfare

The adversary has enormous capabilities in the cyber world, but it too is not without its vulnerabilities, and these must be exploited says Calum MacLeod.

Getting to the heart of the problem

Getting to the heart of the problem

As the Heartbleed bug demonstrates, passwords - especially the way they are commonly used across sites - are inherently vulnerable suggests Chris Russell

Changing the cost of cybercrime

Changing the cost of cybercrime

Oganisations need to cooperate and share threat intelligence in order to increase the cost of cyber attacks for hackers suggests Russ Spitler, VP product management, AlienVault

Internet of Things - Top Ten concerns

Internet of Things - Top Ten concerns

Mark O'Neill suggests that his top ten potential vulnerabilities of the Internet of Things (IoT), need to be considered now, before mass deployment.

Why immersive training works

Why immersive training works

If you don't want your security training to be as compelling as an airplane safety presentation, vary the content and make an emotional connection says Scott Greaux.

Meet the new DoS - not the same as the old DoS

Meet the new DoS - not the same as the old DoS

A modest DNS investment can pay significant dividends in reducing the impact of DDoS attacks suggests Bruce Van Nice.

Don't let Snowden leaks chill cloud adoption

Don't let Snowden leaks chill cloud adoption

Cloud storage is itself under a cloud following Snowden, yet ironically its where the leaked data remains most secure says Campbell Williams

The challenge for cybersecurity is to find leadership

The challenge for cybersecurity is to find leadership

The way to avoid management by crisis is by having a strategy, goals, and plans to achieve them says Jarno Limnéll

Third-party access adds vulnerability

Third-party access adds vulnerability

Its time to take back third party remote access and increase visability on the network says Stuart Facey

BYOD - the hidden dangers

BYOD - the hidden dangers

Amir Lehr asks, What happens when your mobile ends up in someone else's hands?

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more