Opinion

A push for data-centric security: What organisations must consider

A push for data-centric security: What organisations must consider

Ron Arden takes a data-centric approach to security where the focus is on protecting the data within a system, and not just the system itself

The five pillars of Network Access Control (NAC) needed to enforce BYOD

The five pillars of Network Access Control (NAC) needed to enforce BYOD

Paul Donovan outlines the main questions to ask when choosing a NAC solution to work alongside a BYOD policy while protecting the network

Email is dead ... Long live malicious email

Email is dead ... Long live malicious email

email is one of the main routes for delivering malware into the enterprise, but despite frequent reports of its demise, it appears here to stay, so companies had better tailor their security posture accordingly says Carl Leonard.

Protecting Your Business Advantage

Protecting Your Business Advantage

Andrew Rogoyski says that companies need to identify what is truly their most sensitive, most valuable data - the thing that would most severely impact the company if stolen or compromised.

UK Cyber-security after Brexit: May not be as bad as it first appears

UK Cyber-security after Brexit: May not be as bad as it first appears

It's difficult to predict how the global and British economies will react to Brexit in the long run, however UK Cyber-security has every chance of staying in very good shape says Ilia Kolochenko.

The battle between security and privacy

The battle between security and privacy

Joanna Ward looks at the recent battles between tech providers and law enforcement agencies over encryption and considers how the escalation potentially be avoided.

No inbox left behind: What security education lacks and how we might fix it

No inbox left behind: What security education lacks and how we might fix it

Itay Glick says that new spear-phishing scams suggest that this method of spreading malware will surely continue to grow

Biometrics or a password?

Biometrics or a password?

Tony Anscombe asks, which is more secure, the password or biometrics?

Ransomware: The great white shark of malware, and what you need to do about it

Ransomware: The great white shark of malware, and what you need to do about it

The threat of a cyber-attack is a concern for us all, but nothing strikes more fear than ransomware says Mark Kedgley.

Driving (cyber) security

Driving (cyber) security

Paco Hope asks if black boxes can make our cars and lives less safe instead of safer