Staff need ongoing training in defending against the latest threats - which currently includes LinkedIn says Andrew Tang, service director, security at MTI Technology
Security is a reasonable concern when considering moving your IT services to the cloud, but four key questions can help you assess the risk, says Chris Pace.
A prison escape with a fake release note, from a fake website, set up via mobile phone, demonstrates yet again that people are our biggest security vulnerability says Fotis Gagadis.
You need to delve deeper into the risks in your supply chain to really know what your exposure is says Nick Ford.
Security researchers uncover 'grinch' vulnerability that could affect all Linux systems
Two thirds of users still using the same password across multiple accounts says survey.
Paul Bonner advises companies merging to take the best security practice from each component company, and not impose the practices of the dominant player - or resistance is likely.
Preparation and organisation can enable effective security for one man SOCs or small teams explains Joe Schreiber.
Security awareness training must be high on the agenda of best practice when companies fight off cyber threats, experts concluded at the SC Congress London.
The strength of Apple's email encryption is called into question by independent security research firm NESO Labs.
Privilege controls can work, but cannot cater for all eventualities, says Quocirca analyst Rob Bamforth.
A stellar panel of infosec experts told a packed audience at SC Congress London on Thursday that security awareness can play an integral role in educating C-suite on threats coming from inside and outside the company.
PCI DSS 3.0 may be on the horizon, but a new study suggests that companies are not only slow in updating, but also approaching compliance in the wrong way.
The ignorance of most UK office workers about phishing, one of the most lethal forms of cyber threat, has been revealed in a new study.
Leading security consultant says DDoS attacks remediation more complex than many would observe.
CESG, the Information Security Arm of GCHQ, has released new security guidance for more than ten different end user devices to ensure they are configured and used in the most efficient way compatible with meeting security demands.