There are security vulnerabilities when using passwords, but Tyler Moffitt says that there are steps that you can and should take to make sure your data less easy to access.
Biometric id options need appropriate mobile computing support to ensure that they too are not compromised says Jon Geater.
Having comprehensive cyber risk policies that are not followed can be as detrimental as not having a policy at all says Peter Given.Good who advises that good risk-insurance will demand appropriate procedures are both in place and implemented.
Whatever Snowden's motivations, Ilia Kolochenko contends that the industry has misused the resulting information and often sold kit rather than true security solutions and expertise.
Despite the recent iCloud breach, cloud security is better than its current image suggests - and if you are demanding of your supplier, it can be better still says Jamal Elmellas.
Deploying appropriate technology is necessary to protect business critical information stored within racks and cabinets at data centres says Mark Hirst.
Individuals want privacy for their data, but they will share it if they can explicitly choose to do so having been told what benefits they will gain says Sachiko Scheuing.
Increased consequences for the loss of non-financial data, especially fines from regulators, is expected to drive a more rigorous approach to data protection suggests Fergus Kennedy.
Intelligence-led third party red-teaming testers can identify the blind spots that in-house teams thought they had covered suggests Simon Saunders.
Identity, payment and security need to become seamless and inherently more secure in themselves than anything we currently use for mobile identity, says Nick Barth.
This is how to secure data in the cloud
Exclusive video webcast & Q&A sponsored by Vormetric
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.