Opinion
Opinion
IT security
-
Brexit and technology: How network effects will damage UK IT industry
Although largely ignored in the Brexit debate, network effects will damage the UK's high-tech industry if Britain leaves Europe Continue Reading
-
Security Think Tank: Infosec pros need to identify and protect GDPR-relevant data
What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: Understanding compliance with the GDPR
What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: All aboard as European data regulation nears final station
What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: How infosec pros should influence prep for GDPR
What is the role of information security professionals in ensuring organisations comply with the EU General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: Key GDPR issues for infosec pros to address
What is the role of information security professionals in ensuring organisations comply with the EU General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: Infosec pros can kickstart GDPR prep with data audit
What is the role of information security professionals in ensuring organisations comply with the EU General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Security Think Tank: Information security professionals have key role in GDPR compliance
What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018? Continue Reading
-
Managing open-source security: a legal perspective
Open-source software is being used more widely than ever – but do IT leaders understand the legal risks? Continue Reading
-
Israel’s cyber security frontier
The Israeli city of Beer Sheva is quickly becoming a global centre of cyber security technology Continue Reading
-
Security Think Tank: Internal up-skilling key to tackling cyber security skills shortage
What strategies can organisations use to ensure that they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
Security Think Tank: Guidelines for improving the effectiveness of IT security recruitment
What strategies can organisations use to ensure that they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
The European Cloud Initiative: A silver lining for data sharing?
The European Commission has published proposals for a new cloud initiative – part of a package of measures designed to enhance the EU’s position in the global, data-driven economy Continue Reading
-
Security Think Tank: Identifying, attracting and keeping the right IT security talent
What strategies can organisations use to ensure that they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
Fear, uncertainty and data doubt hold back public Wi-Fi
Venue owners’ uncertainty and befuddlement over what they can actually do with their Wi-Fi infrastructure and the data carried over it is hindering their ability to realise the full potential of public Wi-Fi Continue Reading
-
Security Think Tank: Focus IT security recruitment on risk management
What strategies can organisations use to ensure that they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
Privacy Shield: Imperfect and incomplete
Adoption of Privacy Shield is unlikely before June 2016, and the scheme is likely to be challenged by national data protection authorities and individuals, writes Huw Beverley-Smith Continue Reading
-
Security Think Tank: HR and IT security collaboration key to skills crisis
What strategies can organisations use to ensure they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
Security Think Tank: Strategies for meeting cyber security skills needs
What strategies can organisations use to ensure they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked? Continue Reading
-
Security Think Tank: Five tips for creating a patch management strategy
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
Security Think Tank: Security patching an essential element of outsourcing contracts
What strategies can companies adopt to keep up and deal with the huge volume of software updates they face? Continue Reading
-
Security Think Tank: Allocate maintenance processes to each piece of key software
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
Security Think Tank: Using vulnerability management to support the patching process
What strategies can companies adopt to deal with the huge volume of software updates they are facing? Continue Reading
-
Security Think Tank: Tackle vital patching challenge with risk-based approach
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
Security Think Tank: Six alternative strategies to centralised security patching
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
Security Think Tank: Five strategies for dealing with software security updates
What strategies can companies adopt to keep up with, and deal with, the huge volume of software updates they face? Continue Reading
-
Security Think Tank: Software patching needs executive sponsorship
What strategies can companies adopt to keep up with, and deal with, the huge volume of software updates they face? Continue Reading
-
Security Think Tank: Ignoring software patching spells trouble
What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? Continue Reading
-
Investigatory Powers Bill: What it means for UK tech startups
The proposed Investigatory Powers Bill could prove damaging for innovative high-tech companies, writes Tirath Bansal, founder and CEO of internet startup myorb.com Continue Reading
-
Security Think Tank: Many breaches down to poor access controls
In the modern business environment, what are the most common access control mistakes – and how best are these corrected? Continue Reading
-
Don’t think that Brexit will save you from the EU data protection rules
The EU General Data Protection Regulation will still apply to UK companies dealing with the EU, regardless of whether the UK remains in the union Continue Reading
-
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
-
Are cloud users worrying about nothing when it comes to data sovereignty?
With the upheaval surrounding the EU-US Privacy Shield, Clive Longbottom takes a closer look at the issue of sovereignty Continue Reading
-
Security Think Tank: How to keep on top of access control
In the modern business environment, what are the most common access control mistakes and how can these best be corrected? Continue Reading
-
Security Think Tank: Access control is key to protecting against cyber attacks
In the modern business environment, what are the most common access control mistakes and how can these best be corrected? Continue Reading
-
Security Think Tank: Top five access control mistakes
In the modern business environment, what are the most common access control mistakes and what is the best way to correct them? Continue Reading
-
Security Think Tank: Policies and procedures vital for successful access control
In the modern business environment, what are the most common access control mistakes and what is the best way to correct them? Continue Reading
-
Security Think Tank: Password management tops list of access control issues
In the modern business environment, what are the most common access control mistakes and how best are these corrected? Continue Reading
-
Security Think Tank: Human factor key to access control
In the modern business environment, what are the most common access control mistakes and how best are these corrected? Continue Reading
-
Security Think Tank: Ransomware defence requires focus on three key areas
What is the best strategy for business to protect against ransomware? Continue Reading
-
Security Think Tank: Three-pronged approach to defend against ransomware
Ransomware is becoming increasingly prevalent in the world of cyber crime. What is the best strategy for businesses to protect against it? Continue Reading
-
Security Think Tank: Ransomware exploits poor security practice in SMEs
What is the best strategy for business to protect against ransomware? Continue Reading
-
Security Think Tank: Four steps for companies to protect against ransomware
What is the best strategy for business to protect against ransomware? Continue Reading
-
Security Think Tank: Employee awareness key to halting ransomware attacks
What is the best strategy for business to protect against ransomware? Continue Reading
-
Security Think Tank: User education is first line of defence against ransomware
What is the best strategy for business to protect against ransomware? Continue Reading
-
Floods reveal weaknesses in the resilience of UK broadband
December’s floods exposed a major flaw in the UK’s fibre to the cabinet networks, which are almost impossible to waterproof Continue Reading
-
When a slowdown in IT budgets is a good thing
IT budgets will grow at their slowest rate for four years in 2016, yet companies are spending more on digital technology Continue Reading
-
Saving Bletchley Park: The women of Station X
Sue Black recalls her first experience of Bletchley Park and the women who worked there, inspiring a campaign to save the home of the WW2 codebreakers Continue Reading
-
Security Think Tank: Get business value from security testing services by insourcing
How can an organisation ensure it gets value from penetration and security testing services? Continue Reading
-
Security Think Tank: Start with threats to increase value of penetration testing
How can an organisation ensure it gets value from penetration and security testing services? Continue Reading
-
Security Think Tank: Selecting the right pen tester helps deliver most value
How can an organisation ensure they get value from penetration and security testing services? Continue Reading
-
Security Think Tank: Penetration testing still relevant, but approach needs to change
How can an organisation ensure it gets value from penetration and security testing services? Continue Reading
-
Security Think Tank: Pen testing must be followed by action
How can an organisation ensure they get value from penetration and security testing services? Continue Reading
-
Security Think Tank: Clarity of scope is key to getting value from pen testing
How can an organisation ensure they get value from penetration and security testing services? Continue Reading
-
Security Think Tank: Pen testing should be about risk, not box-ticking
How can organisations ensure they get value from penetration and security testing services? Continue Reading
-
Security Think Tank: Classification is the first step to personal data security
How should businesses go about setting up and maintaining a comprehensive and accurate inventory of personal data? Continue Reading
-
Security Think Tank: Find out what personal data your company holds
How should businesses go about setting up and maintaining a comprehensive and accurate inventory of personal data? Continue Reading
-
Security Think Tank: Create a data security culture to keep data safe
How should businesses go about setting up and maintaining a comprehensive and accurate inventory of personal data? Continue Reading
-
Security Think Tank: Three steps to personal data security
How should businesses go about setting up and maintaining a comprehensive and accurate inventory of personal data? Continue Reading
-
Security Think Tank: IAOs key to setting up asset registers
How should businesses go about setting up and maintaining a comprehensive and accurate inventory of personal data? Continue Reading
-
What does the new EU data protection regime mean for datacentres and cloud service operators?
Changes to European data protection law will put new responsibilities on datacentre and cloud providers Continue Reading
-
Can the IT department fix personal data?
Disruptive technologies can help solve the problem of managing personal data, but IT needs to team up with marketing and finance teams to make it work Continue Reading
-
Security Think Tank: Threat intelligence feeds not for everyone
What is the best practice for collecting and using threat indicators from security incidents to improve defences against future cyber attacks? Continue Reading
-
Government must listen to tech sector in Investigatory Powers Bill
Plans for new powers to allow intelligence agencies to monitor electronic communications must be carefully thought through Continue Reading
-
Security Think Tank: Security intelligence is useful only if isolated from the noise
What is best practice for collecting and using threat indicators from security incidents to improve defences against future cyber attacks? Continue Reading
-
Supercharging cyber security protection: Questions to ask when hiring a managed services provider
With information security concerns and challenges at an all-time high, and a global shortage of security professionals to address them, some enterprises are turning to managed security services for help. To ease the selection process, Dragana Vranic... Continue Reading
-
Security Think Tank: Security intelligence demands getting the basics right
What is the best practice for collecting and using threat indicators from security incidents to improve defences against future cyber attacks? Continue Reading
-
Security Think Tank: Keep C-suite informed on incidents to drive better security
What is the best practice for collecting and using threat indicators from security incidents to improve defences against future cyber attacks? Continue Reading
-
Security Think Tank: Addressing the gap between security data and intelligence
What is the best practice for collecting and using threat indicators from security incidents to improve defences against future cyber attacks? Continue Reading
-
How to mitigate security risks associated with IoT
There are five key information security risks associated with the internet of things that businesses can and should address Continue Reading
-
Are you exposed? Lessons from Ashley Madison
Data breaches are only a matter of time so companies need to know what to do to prevent, respond and contain breaches when they happen Continue Reading
-
Network security systems – dedicated or multifunction?
For small and medium-sized businesses looking to secure their networks, multifunction security systems are a better option than best-of-breed technology Continue Reading
-
Security Think Tank: Three key cyber resilience goals
How can companies best assess business resilience to identify the gaps and improve business resiliency to reduce the impact of cyber attacks? Continue Reading
-
Security Think Tank: Resiliency is the single most effective response to cyber attacks
How can companies best assess business resilience to identify the gaps and improve business resiliency to reduce the impact of cyber attacks? Continue Reading
-
Security Thank Tank: Business resilience should be proactive, not reactive
How can companies best assess business resilience to identify the gaps and improve business resiliency to reduce the effect of cyber attacks? Continue Reading
-
Security Think Tank: Resilience basics will work for any size of business
How can companies best assess business resilience to identify the gaps and improve business resiliency to reduce the impact of cyber attacks? Continue Reading
-
Security Think Tank: Aim at joined-up security for clearer risk view
How can companies best assess business resilience to identify the gaps and improve business resiliency to reduce the effect of cyber attacks? Continue Reading
-
Why HTML5 must replace Flash
Author Robin Nixon explains why the days of Flash are numbered Continue Reading
-
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
-
How changes to EU data protection law could affect UK business
Prudent businesses are now preparing for the forthcoming EU General Data Protection Regulation Continue Reading
-
Security Think Tank: Aim for win-win in SecDevOps
How can development, operations and security teams collaborate around change to ensure security is maintained and even improved? Continue Reading
-
Security Think Tank: Cyber security should be a pillar of any business plan
How can development, operations and security teams collaborate around change to ensure security is maintained and even improved? Continue Reading
-
Security Think Tank: Involve all stakeholders to ensure smooth, secure change
How can development, operations and security teams collaborate around change to ensure security is maintained and even improved? Continue Reading
-
Security Think Tank: Security needs to be part of change management processes
How can development, operations and security teams collaborate around change to ensure security is maintained and even improved? Continue Reading
-
Security Think Tank: Security is always a functional requirement of change
How can development, operations and security teams collaborate around change to ensure security is maintained and even improved? Continue Reading
-
European regulation shakes up online payments security
Payment service providers and merchants should lose no time in assessing the affect of proposed European security regulations Continue Reading
-
What next for online age verification in the UK?
Websites will need to check the age of users if the Conservatives' proposed laws on restricting access to adult content go ahead Continue Reading
-
NHS Care.data: The security concerns
As NHS England restarts its Care.data programme, we look at how it is intended to work, the legislative background and the data security concerns Continue Reading
-
Recruiting for cyber security: What businesses need to know
When it comes to cyber security, figuring out what you need is the easy part. Figuring out who you need, can be tricky Continue Reading
-
Security Think Tank: Smart log monitoring and analysis key to security success
How can log management be used to bolster information security and improve incident response without infringing user privacy? Continue Reading
-
Security Think Tank: Guidelines to enable security to get the most out of log management
How can log management be used to bolster information security and improve incident response without infringing end user privacy? Continue Reading
-
Security Think Tank: Merging big data and security is the way to go
How can log management be used to bolster information security and improve incident response without infringing user privacy? Continue Reading
-
Security Think Tank: Making the most of logs with SIEMs
How can log management be used to bolster information security and improve incident response without infringing end user privacy? Continue Reading
-
EU General Data Protection Regulation comes into sharper focus
European authorities have reiterated their resolve to reach an agreement by the end of 2015 on a new data protection law that will reach beyond Europe Continue Reading
-
The internet of things is an opportunity not a threat
Businesses need to explain how they will use data generated by the internet of things to avoid public fears over how that data is used Continue Reading
-
Three things you may not know that DNS data can tell you
Big data tools can help network administrators gather new insights into security and performance from DNS data Continue Reading
-
Closing the gaps in EU cyber security
Inconsistent approaches to cyber security across Europe are undermining attempts to harmonise policy and preparedness in the EU Continue Reading
-
Security Think Tank: Proceed with caution using IP-based collaboration tools
How can businesses of all sizes ensure that employees are able to collaborate effectively without the risk of compromise to the company IT network or systems? Continue Reading
-
Security Think Tank: Keep it simple and risk-based to secure collaboration
How can businesses of all sizes ensure that employees are able to collaborate effectively without the risk of compromise to the company IT network or systems? Continue Reading
-
Security Think Tank: Select collaboration tools carefully to keep data secure
How can businesses of all sizes ensure that employees are able to collaborate effectively without the risk of compromise to the company IT network or systems? Continue Reading