Today, as the Fourth Industrial Revolution (Industry 4.0) gathers pace, all areas of industry are experiencing new technological changes at a speed, scale and force unlike anything we have ever seen before says Paul Appleby.
Fundamental issues with the nature of security mean that passwords aren't going anywhere for the foreseeable future says Bill Carey who sees their role remaining as part of multi-factor solutions.
Dr Adrian Davis shares his top EMEA technology and security trends to watch this year including changing consumer expectations of data use and privacy as its value becomes apparent.
Both Dyre and Dridex Trojans now use a combination of local redirection and RAT to effectively escape detection by current anti-fraud and security tools, but Uri Rivner says real-time behaviour analysis can still spot the bad guys.
In instalment one of his four-part viewpoint series, Tony Collings outlines the first of his essential building blocks for the successful implementation of an IT project: have you got the business requirement right?
The threats faced and intelligence needed in enterprise security is always changing and the organisations that stay on top of these trends will be best placed to handle whatever comes their way says Mark Hughes.
The humble password is often seen as obsolete and ineffective. David Howell suggests that Secure Shell (SSH) key technology has several key advantages and can help to deliver the post-password world.
Many enterprise CIOs are learning how Software Defined Networking (SDN) and Network Function Virtualisation (NFV) can bring about business transformation as well as IT efficiencies says Craig D'Abreo.
New tools are making real time data analysis and exploration of DNS traffic possible. This is turning previously ignored data into a source of valuable insight says Chris Griffiths.
The TalkTalk breach was not an isolated incident says Clayton Locke who advises companies on the need to monitor user-behaviour for inconsistencies.