Opinion
Opinion
IT for small and medium-sized enterprises (SME)
-
The internet of things: an overview
Despite security and other concerns, there are many benefits associated with embracing the internet of things Continue Reading
-
Security Think Tank: Risk of DNS attacks goes beyond websites
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Security Think Tank: Top three DNS-related security risks
What are the main security risks associated with the domain name system and how are these best mitigated? Continue Reading
-
Security Think Tank: Communication is key to cyber security in digital era
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
-
A new nearshoring game is emerging
Countries selling themselves as nearshore business services locations need to change their sales pitches to avoid becoming like all the other countries doing the same Continue Reading
-
Consumer identity management is the core of real CRM
IAM + CRM is much more than simply IAM for external users, says Ivan Niccolai Continue Reading
-
Six essential processes for keeping data secure
Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation Continue Reading
-
Security Think Tank: Many breaches down to poor access controls
In the modern business environment, what are the most common access control mistakes – and how best are these corrected? Continue Reading
-
Security Think Tank: Top five access control mistakes
In the modern business environment, what are the most common access control mistakes and what is the best way to correct them? Continue Reading
-
Can legislation stop cyber crime?
Rising cyber crime suggests criminal law does not deter criminals and that a better legal solution is required to prevent further rises Continue Reading
-
Five questions every board should ask after Sony Pictures breach
What can the board do to avoid having to answer embarrassing questions at the next shareholder meeting? Continue Reading
-
User acceptance testing needs real training, not just a short course
In spite of its importance, user acceptance testing (UAT) is often chaotic, problematic and ineffective Continue Reading
-
Privacy concerns in the digital world
Considering the full spectrum of privacy, people need to ask themselves if they are comfortable with all their characteristics in the public domain Continue Reading
-
How to appoint a new outsourcing supplier
Outsourcing can come with its own security risks if not managed appropriately, making due diligence and clear contractual arrangements key Continue Reading
-
The ideology of hacking
Business leaders need to be educated on the true threats their firms face and IT security professionals have to arm their executives with that information Continue Reading
-
How to assess the security of a cloud service provider
As businesses continue to put more information online, understanding cloud suppliers and agreements has never been more important Continue Reading
-
Security Think Tank: You can’t protect what you don’t know you’ve got
IP theft: who should be tackling it and how? Continue Reading
-
How to survive a data breach
Six practical tips on how to prepare for and survive a data breach Continue Reading