Infosecurity Opinions
Defence in Breadth
Exploring the security imperative for today’s complex networks and the need to look at breadth, as well as depth.
How Do You Really Know if Your Software Security Measures Up?
Organisations are trying to determine where to start, how to construct a viable initiative, and what resources they will require.
How Can You Fend Off a Nation?
While many cyber-attacks are crude in their design and sloppy in their deployment, state sponsored attacks can sometimes exude sophistication.
Liability Can Change Attitudes to Corporate Cybersecurity
As Britain marks 50 years since the first seatbelt law was introduced this month, we celebrate how driver liability changed norms and saved thousands of lives.
‘Dark DDoS’ – a growing cyber security threat for 2016
A ‘Dark DDoS’ acts as a smokescreen to distract IT teams from the real breach that’s taking place.
Let’s Get Physical: Securing Data in Connected Homes, Cars & Everywhere Else
When you look at connected household products like smart refrigerators and thermostats, they have a much longer lifecycle than the average period of time a person stays in one residence. That’s why protecting the enormous amounts of data transmitted through digital devices to these gadgets is vital.
The Burst of the EMV Bubble
Despite stronger measures coming in, there are still breaches, skimming and fraud, and in fact, they are just as bad as they have ever been.
Passivity may risk Security and Reliability of your Active Directory
Top tips on turning an Active Directory implementation into a dream scenario.
Protecting Corporate Data without Compromising on Experience
The biggest challenge in this new age of data flow is to ensure corporate data remains secure, without restricting access to the hardware and software that employees want to use.
Changing the Security Team’s Focus from Malware to the Credentials that Enable It
Once an attacker has access to a good set of credentials, its game, set and match.
Victims or Villains: Intelligent Incident Response Can Save the Day
Data breaches are happening with greater frequency, and are compromising larger volumes of data, than ever before and response is now key.
Longest Serving Member of the Team? Your Work Email Account
When an employee leaves, their work email survives. What measures are you putting into place to make sure that filtering is done.
2016 – The Year of the Cyber Exploit
After breaches in 2015, 2016 will be considered the ‘year of the exploit’ as we will see a shift to higher impact cybercrime.
The Cybersecurity Domino Effect
The interlinked economy could be the biggest problem in security, and provide the weakest link.
Shedding Light on the Dark Web
The Government is to set up a task force to police the dark web.
Is the Cyber Security Skills Gap Putting You in Danger?
Cyber attacks have the potential to disrupt governments, destroy businesses, and put our personal safety in jeopardy. Yet this critical sector of the technology world suffers from a severe deficit of skilled workers to fill its jobs.
At Heart, We Are All Hacktivists
Do ethics exist online, and whose determination is it on what is good and bad?
How should businesses deal with social media risks?
There is a simple solution to the risks of social media, however; it might not be possible for many businesses.
The Need for Data Centric Security
Protecting data is more of a challenge with mobile devices, so how do you protect a piece of data once it leaves the person who created it?
Uncovering Covert Attack Communications Inside Your Network
Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks.