Opinion
Opinion
IT security
-
Security Think Tank: Equip employees to guard against malicious attachments
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? Continue Reading
-
Security Think Tank: Don’t blame employees – give them secure working environments
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? Continue Reading
-
Security Think Tank: Key things to consider to block malicious email attachments
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? Continue Reading
-
Understanding the economic value of your personal data
Your personal data is worthless – it's only when it's processed by the Facebooks or Googles of this world that it has business value Continue Reading
-
Security Think Tank: Employees are one of the greatest defences
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? Continue Reading
-
Security Think Tank: Minimise malware risks through education, process and technology
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? Continue Reading
-
The growing influence of the CIO
The role of IT leaders has changed radically over the past decade. Today, digital technology is bringing CIOs new opportunities, higher budgets and the chance to make a strategic difference Continue Reading
-
Security Think Tank: User education key to blocking email-borne malware
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? Continue Reading
-
Security Think Tank: 10 control areas to mitigate against malware attacks
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? Continue Reading
-
Security Think Tank: Malware is sneaky
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? Continue Reading
-
General Election 2017: Lib Dems want strong infrastructure and less state surveillance
Liberal Democrat shadow business secretary Susan Kramer on the party’s plans to strengthen the UK’s infrastructure, protecting privacy and making sure a digital by default government leaves nobody behind Continue Reading
-
Five steps for business after WannaCry cyber attack
WannaCry reveals some important facts about our dependence on the internet and IT Continue Reading
-
Gov.uk Verify and identity assurance - it's time for a rethink
The government's Verify identity platform is not meeting user needs - it's time to step back and review how best to make online identity for public services work Continue Reading
-
Fake tech support spiders on the world wide web
Fake tech support should be incorporated into security awareness training as it can be a highly effective way to trick employees into granting access to enterprise computer systems Continue Reading
-
Security Think Tank: How one organisation’s incident can become everyone’s defence
How can organisations use red teaming to identify security gaps? Continue Reading
-
Security Think Tank: Red teaming benefits to business can be profound
How can organisations use red teaming to identify security gaps? Continue Reading
-
Storm clouds gather for US-EU Privacy Shield data deal
The European Parliament justice committee launches unprecedented criticism of Privacy Shield, while the Irish Court mulls future of binding corporate contracts Continue Reading
-
Security Think Tank: How to maximise the value of red team exercises
How can organisations use red teaming to identify security gaps? Continue Reading
-
Security Think Tank: Red teaming can help businesses identify best security controls
How can organisations use red teaming to identify security gaps? Continue Reading
-
Security Think Tank: How to get the best out of red team exercises
How can organisations use red teaming to identify security gaps? Continue Reading
-
Security Think Tank: Red teaming will benefit security mature organisations most
How can organisations use red teaming to identify security gaps? Continue Reading
-
What to do first when hit by a cyber attack
What actions should organisations take if they suspect they have suffered a cyber security incident? Continue Reading
-
Security Think Tank: A real world approach to security testing
How can organisations use red teaming to identify security gaps? Continue Reading
-
Security Think Tank: Time to look at red teaming?
How can organisations use red teaming to identify security gaps? Continue Reading
-
Security Think Tank: Business input will help keep security usable and cost effective
How can organisations maintain usability and keep support costs low without compromising on security? Continue Reading
-
Cyber defence just one of the skills next-gen IT professionals will need
Emerging technologies, the impact of Brexit and fintech companies are creating new opportunities for the next generation of IT professionals Continue Reading
-
Security Think Tank: Four guidelines on how balance security, usability and cost
How can organisations maintain usability and keep support costs low without compromising on security? Continue Reading
-
Security Think Tank: Use flexible tech backed by security policy for competitive edge
How can organisations maintain usability and keep support costs low without compromising on security? Continue Reading
-
Security Think Tank: Enable people using good security and risk methodology
How can organisations maintain usability and keep support costs low without compromising on security? Continue Reading
-
Security Think Tank: Minimise data to cut costs and comply with GDPR
How can organisations maintain usability and keep support costs low without compromising on security? Continue Reading
-
PSD2 – time to open and secure APIs and rethink business models
With the EU’s Payment Service Directive (PSD2) going into effect in January 2018, banks have no time to waste in preparing for the changes it will bring Continue Reading
-
Security Think Tank: Education and automation will up security and cut user friction
How can organisations maintain usability and keep support costs low without compromising on security? Continue Reading
-
Security Think Tank: Practical steps to increasing security without reducing usability
How can organisations maintain usability and keep support costs low without compromising on security? Continue Reading
-
Security Think Tank: Governance framework key to best security at lowest cost
How can organisations maintain usability and keep support costs low without compromising on security? Continue Reading
-
Moving forward and looking back
This is the fourth and last in a series of articles charting the progress of participants from HutZero, a new cyber security entrepreneur acceleration programme run by Cyber London (CyLon) and the Centre for Security Information Technologies (CSIT) ... Continue Reading
-
Most companies wide open to “cataclysmic” hack, especially after M&A
Companies are leaving themselves wide open to cyber crime, especially after M&A, so companies need to start enabling cyber-security professionals before they face serious problems Continue Reading
-
Finance firms are vulnerable to cyber attacks, so why do customers think they are secure?
The public are overly confident in the ability of banks and financial institutions to protect their data, but that will change when mandatory reporting comes in next year under the General Data Protection Regulation Continue Reading
-
The true impact of a cyber breach on share price
As cyber security breaches become increasingly common, a security consultant explores how recent headline breaches have affected company valuations Continue Reading
-
Navigating those early stages: research in its many forms
This is the third in a series of articles charting the progress of participants from HutZero, a new cyber security entrepreneur acceleration programme run by Cyber London (CyLon) and the Centre for Security Information Technologies (CSIT) at Queen’s... Continue Reading
-
From bootcamp to business: getting connected
This is the second in a series of articles charting the progress of participants from HutZero, a new cyber security entrepreneur acceleration programme run by Cyber London (CyLon) and the Centre for Security Information Technologies (CSIT) at Queen’... Continue Reading
-
The internet of things: an overview
Despite security and other concerns, there are many benefits associated with embracing the internet of things Continue Reading
-
Security Think Tank: Risk of DNS attacks goes beyond websites
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Why Azure developers need security skills
The unprecedented adoption of Microsoft Azure is a huge opportunity for developers, but they must keep their security skills updated Continue Reading
-
Security Think Tank: Integrity of business data key to cyber defence
What types of organisation are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
-
Government is quietly asking suppliers to pick up the tab for cyber security
The government's new approach to working with cyber security suppliers is bringing a shift in responsibility and risk to the private sector Continue Reading
-
Security Think Tank: Three strategies against data integrity attacks
What type of organisations are likely to be targeted by data integrity breaches, and how best can they detect and mitigate against such attacks? Continue Reading
-
Security Think Tank: Data integrity attack could happen to any company
What type of organisations are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
-
Security Think Tank: Data custodians likely to be top targets of integrity attacks
What types of organisation are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
-
Security Think Tank: Build in controls to protect against data integrity attacks
What type of organisations is likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
-
Security Think Tank: Data integrity breaches – the challenge facing banks
What type of organisation is likely to be targeted by data integrity breaches and how best can they detect and mitigate such attacks? Continue Reading
-
Security Think Tank: Integrity attacks tough, but not impossible to spot
What type of organisations is likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
-
Security Think Tank: Under-the-radar data integrity attacks expected to rise
What type of organisations are likely to be targeted by data integrity breaches, and how can they best detect and mitigate against such attacks? Continue Reading
-
Security Think Tank: Governance and oversight key to data integrity
What type of organisations are likely to be targeted by data integrity breaches, and how can they best detect and mitigate against such attacks? Continue Reading
-
Nurturing a tech-literate generation
The UK tech sector is leading the way in protecting children online, and helping to promote Safer Internet Day Continue Reading
-
European Commission announces initiatives on the data economy, e-Privacy and data protection
The European Commission (EC) recently announced the final packages to be adopted under its Digital Single Market strategy: an initiative on the data economy and proposals for the review of the e-Privacy Directive and the protection of personal data Continue Reading
-
Is ‘OK’ OK? Delivering the next government network platform
As GDS signals its intent to move away from the Public Services Network, the industry and public sector must work together to create a new internet-based network platform for government Continue Reading
-
Security Think Tank: Look to security best practices to secure DNS
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Security Think Tank: DNS, the underdog in cyber security strategy
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Security Think Tank: Use DNS proxy services to bolster security
What are the main security risks associated with DNS, and how are these best mitigated? Continue Reading
-
Security Think Tank: Add risk of DNS attack to business continuity plan
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Security Think Tank: Business should arm against rise in DNS server attacks
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Security Think Tank: Top three DNS-related security risks
What are the main security risks associated with the domain name system and how are these best mitigated? Continue Reading
-
Security Think Tank: Know the business risks of using the internet
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
Inside the UK’s first cyber security entrepreneur boot camp
This is the first in a series of articles charting the progress of participants from HutZero, a new cyber security entrepreneur acceleration programme run by Cyber London (CyLon) and the Centre for Security Information Technologies (CSIT) at Queen’s... Continue Reading
-
Security Think Tank: Simplify infosec messages: If not X, then Y and Z
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: Communication is key to cyber security in digital era
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: How to make cyber risk easier for business to understand
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: Cyber risk not just an IT issue
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: Cyber security must be recognised as a fundamental component of business
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: Cyber security is everyone’s responsibility
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Five tips to improve cyber security in the health sector
Jocelyn Paulley, an IT lawyer at Gowling WLG, shares her top tips on how the NHS can “quick fix” its cyber resilience Continue Reading
-
Security Think Tank: Managing cyber risk requires genuine understanding
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Security Think Tank: Cyber risk – Overlooked? Ignored? Under-appreciated?
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Is the information security supplier market really consolidating?
Mergers and acquisitions continue at pace in the information security market, but these are not necessarily signs of consolidation, writes Martin Kuppinger Continue Reading
-
Fight against Investigatory Powers Bill may not be over
Labour's shadow home secretary Diane Abbott says that wider society must now debate the controversial Investigatory Powers Bill, despite Parliamentary approval Continue Reading
-
Security Think Tank: Cyber insurance may not provide cover where it is most needed
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Ensure cyber insurance is right and helps reduce risk
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Lower insurance premiums through security certification
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Six key factors in cyber insurance
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Understand data assets and risks for insurance success
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Cyber insurance – factor in all costs and obligations
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Cyber insurance a great complement to good security practice
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
Security Think Tank: Back up risk assessment with broker advice on cyber insurance
What should organisations consider if they are to prepare for cyber insurance? Continue Reading
-
New cyber security strategy changes relationship between government and IT suppliers
The government has introduced stringent new responsibilities on IT suppliers in its latest cyber security strategy Continue Reading
-
Self-sovereign identity on the block – ideal or no deal?
There’s a rumour out there in the IT and business world that blockchains could be the magic elixir when it comes to users’ full control and power over their own digital identities. But is that really so? Continue Reading
-
Getting the balance right now the big data genie is out the bottle
Big data is a fact of life, but getting the balance right when it comes to privacy is crucial to avoid litigation and fines Continue Reading
-
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon Continue Reading
-
The UK needs a data infrastructure
Public data needs to be open and protected, and should be treated as part of our critical national infrastructure Continue Reading
-
Security Think Tank: Defend against phishing with training, technology and reporting
What are the most effective types of security controls and user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Phishing: protect, educate and limit damage
What are the most effective types of security controls and end user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Four key elements to defending against phishing attacks
What are the most effective types of security controls and end user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Combine technology and communication to combat phishing risks
What are the most effective types of security controls and end user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Three-pronged approach to phishing prevention
What are the most effective types of security controls and end user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Making a game of phishing
What are the most effective types of security controls and end user training approaches to dealing with phishing? Continue Reading
-
Security Think Tank: Phishing awareness a key element of a security positive culture
What are the most effective types of security controls and user training approaches for dealing with phishing? Continue Reading
-
Investigatory Powers Bill – the case for mass surveillance
As the Investigatory Powers Bill goes through its final stages in Parliament, a former GCHQ intelligence officer puts the case for the bulk surveillance powers contained in the legislation Continue Reading
-
A Good American: a personal take on mass surveillance
Director Friedrich Moser draws some conclusions on mass surveillance from his groundbreaking documentary on the work of NSA whistleblower, Bill Binney Continue Reading
-
Security Think Tank: Awareness and incident response key to fighting evasive malware
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? Continue Reading
-
Security Think Tank: Business should assess where to use AI to sniff out smart malware
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? Continue Reading
-
Security Think Tank: How to detect the undetectable?
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? Continue Reading