Opinion
Opinion
IT security
-
Security Think Tank: Severing C&C comms is key, but complex
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Security Think Tank: Firms neglect DNS security at their peril
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Security Think Tank: Three steps to detect malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Security Think Tank: How to tool up to catch evasive malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be ... Continue Reading
-
Drawing the line for cyber warfare
With alleged Russian meddling in elections and the state-backed attack on Iran’s nuclear programme, it is becoming difficult to define the boundaries of cyber warfare Continue Reading
-
Security Think Tank: Situational awareness underpins effective security
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure they detect such methods and that all C&C systems are removed, including ‘sleepers’ designed to be activated... Continue Reading
-
Raising security awareness through phishing simulation – how to get it right
Testing employees’ security practices by sending fake phishing emails has become commonplace, but few organisations are conducting such exercises effectively Continue Reading
-
Security Think Tank: Basic steps to countering malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure they detect such methods and that all C&C systems are removed, including "sleepers" designed to be activated... Continue Reading
-
Security Think Tank: Combine tech, process and people to block malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be ... Continue Reading
-
Brexit and digital identity – avoiding future restrictions on digital trade
The UK has been a major contributor to European efforts to establish cross-border digital identities. Governments need to ensure that Brexit does not introduce unwanted restrictions that harm digital trade Continue Reading
-
GCHQ offers help to embryonic Irish cyber security organisation
Ciaran Martin head of the UK's National Cyber Security Centre, part of GCHQ, builds bridges with the Republic of Ireland's intelligence community during an official visit to Dublin Continue Reading
-
Security Think Tank: Top considerations to reduce application layer attacks
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Making the UK the safest place to live and work online
Government, industry and individuals all have to play their part in enhancing cyber security practices Continue Reading
-
Security Think Tank: Gap, risk and business impact analysis key to application security
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: Three ways to safeguard against application layer vulnerabilities
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: Deploy multiple defence layers to protect data-rich applications
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: A three-pronged approach to application security
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Think Tank: Application layer attack mitigation needs to start with risk analysis
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: Defend application layer with good security hygiene
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Security Think Tank: Counter application layer attacks with automation
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
As data volumes grow, backup needs analytics, says StorageCraft CEO
Backup appliance maker’s CEO says backup needs analytics so customers can prioritise restore of critical data in a world where volumes increase by 50% a year Continue Reading
-
Security Think Tank: Focus on security before app deployment
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Mitigating third-party cyber risks in a new regulatory environment
GDPR and the NIS Directive increase the focus on managing cyber security throughout the supply chain. Organisations need to check their suppliers are compliant Continue Reading
-
Security Think Tank: Monitoring key to outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
-
Customers need to be at the centre of GDPR plans
Responding to a breach is not just about data, it is about taking care of, and protecting, customers Continue Reading
-
Security Think Tank: Enable outcomes-based security in software development
What is the first step towards moving from a tick box approach to security to one that is outcomes based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
-
Security Think Tank: C-suite needs to drive outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Security Think Tank: Use Cyber Essentials to kick-start outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Security Think Tank: Shift to outcomes-based security by focusing on business needs
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Everyone, everywhere is responsible for IIoT cyber security
Cyber security in the industrial internet of things is not limited to a single company, industry or region – it is an international threat to public safety, and can only be addressed through collaboration that extends beyond borders and competitive ... Continue Reading
-
Security Think Tank: Start outcomes-based security with asset identification
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Security Think Tank: Security governance key to outcomes-based approach
What is the first step towards moving from a tick-box approach to security to one that is outcomes based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
-
Why the government should rethink the UK’s surveillance laws
The European Court of Human Rights has made clear that the Snoopers’ Charter is an unlawful violation of people’s rights and freedoms Continue Reading
-
Security Think Tank: Supplement security with an MSSP to raise the bar
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Adopt a proactive approach to software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Four key steps to managing software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Four steps to managing software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Balancing cost and risk in software vulnerability management
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: No shortcuts to addressing software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: How to manage software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: How to achieve software hygiene
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Eight controls to manage software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Security Think Tank: Follow good practice to reduce risk of software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Information security risk – keeping it simple
Organisations should start with risk management to understand information security risks and communicate them better internally Continue Reading
-
Better the data you know – how GDPR is affecting UK tech companies
As the dust settles from the General Data Protection Regulation, the implications for technology firms in the UK are becoming clearer Continue Reading
-
AI: Black boxes and the boardroom
Computers can and do make mistakes and AI is only as good its training so relying purely on machine intelligence to make critical decisions is risky Continue Reading
-
Security Think Tank: Outsource security operations, not control
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Outsource responsibility, not accountability
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Almost all security can be outsourced, but not the risk
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Risk tolerance key to security outsourcing policy
What critical security controls can be outsourced, and how do organisations – SMEs in particular – maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Top things to consider in security outsourcing
What critical security controls can be outsourced, and how do organisations – SMEs in particular – maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: A risk-based approach to security outsourcing
What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Security Think Tank: Not all security service providers are created equal
What critical security controls can be outsourced, and how do organisations, SMEs in particular, maintain confidence that they are being managed effectively and appropriately? Continue Reading
-
Smart cities face challenges and opportunities
IHS Markit analysts Noman Akhtar and Kevin Hasley assess the way forward for smart city technology projects around the world Continue Reading
-
Beyond GDPR: ePrivacy could have an even greater impact on mobile
From how we monitor air pollution and manage our public transport systems, to how we enable connected cars and the next generation of 5G mobile services, the forthcoming ePR could have a lasting impact on European society Continue Reading
-
What the ICO's Facebook fine teaches us
Legal expert Alexander Egerton considers whether the ICO’s planned £500,000 fine for Facebook is the precursor of a spate of increased fines across the board, or if it shows the ICO’s stance has not changed and will continue to target certain ... Continue Reading
-
Cyber security: A work in progress
Piers Wilson, director of the Institute of Information Security Professionals, reflects on the findings of the latest IISP industry survey and suggests there is still more work to do Continue Reading
-
Security Think Tank: A good password policy alone is not enough
In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Cracking the code – what makes a good password?
In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Some basic password guidelines
In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Passwords alone are not good enough
In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Firms need to support good password practices
In the light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: How to create good passwords and add security layers
In light of the fact complex passwords are not as strong as most people think and most password strategies inevitably lead to people following them blindly, what actually makes a good password - and when is a password alone not enough? Continue Reading
-
Security Think Tank: Complex passwords provide a false sense of security
In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Security Think Tank: Use pass phrases and 2FA to beef up access control
In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password – and when is a password alone not enough? Continue Reading
-
Security Think Tank: Put more layers around passwords to up security
In light of the fact that complex passwords are not as strong as most people think and most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
Cyber security – why you’re doing it all wrong
Most organisations can list the IT security tools and controls they have, so why do most of them still get the security basics wrong? Continue Reading
-
Digital transformation is just business change
Don't always start with the technology if you're driving transformation, but always start with the business Continue Reading
-
Security Think Tank: GDPR requires unprecedented view of data flows
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Focus on data protection, but do not rely on DLP alone
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Understand data for risk-based protection
Why is it important to know where data flows, with whom it is shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Ignorance about data is tantamount to negligence
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Use data flow information to protect systems
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
GDPR – like a lot of regulation – will mostly benefit the big incumbents
The law of unintended consequences applies to the new EU data protection laws, because the big players it seeks to regulate can better afford to comply Continue Reading
-
Security Think Tank: Data governance is essential to data security
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Data controllers are essential in modern business environment
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Data governance is good for business and security
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
Security Think Tank: Information management means better security
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
-
GDPR may not be perfect, but it’s an important milestone in data protection
It's GDPR day, and TechUK's CEO Julian David writes about what is an important milestone in data protection in the digital world Continue Reading
-
Ethics and tech – a double-edged sword
Just because a business activity is legal doesn’t mean it will be acceptable to customers, as the ethical debates in tech are proving Continue Reading
-
It’s not too late to get GDPR ready
With the GDPR compliance deadline on 25 May 2018, there is little time to get ready, but it is not too late, according to the IAPP, which provides a checklist to help organisations ensure they are in the best position possible for the deadline Continue Reading
-
Hacking the internet of things just got easier – it’s time to look at your security
Are you taking security for internet-connected devices seriously enough? Continue Reading
-
Security Think Tank: Five tips for killing the campers on your network
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
-
Security Think Tank: More time equals more opportunity for cyber attackers
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
-
Security Think Tank: Prevention and detection are key to limit dwell time
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
-
Security Think Tank: Containment should be top priority in cyber breaches
Why is reducing cyber attacker dwell time important, and how should this be tackled? Continue Reading
-
Security Think Tank: Reducing cyber attacker dwell time is critical
Why is reducing cyber attacker dwell time important, and how should it be tackled? Continue Reading
-
Security Think Tank: Reducing dwell has never been more important
Why is reducing cyber attacker dwell time important, and how should this be tackled? Continue Reading
-
Security Think Tank: GDPR compliance one good reason to cut attacker dwell time
Why is reducing cyber attacker dwell time important, and how should this be tackled? Continue Reading
-
GDPR and the right to erasure: hiding in the shadows or welcome shade?
The European Union's new data protection laws introduce a right to be forgotten – but what does it means for corporate IT? Continue Reading
-
Security Think Tank: Reduce attacker dwell time with defence in depth
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
-
How a new ISO standard helps you take control of your IT assets
The updated ISO standard 19770-1:2017 offers IT managers a way to bring their hardware and software assets under a single management standard Continue Reading
-
Security Think Tank: Use good practice to address cryptojacking risk
How can organisations best defend against cryptojacking? Continue Reading
-
Lauri Love escaped extradition to the US - what does that mean for future cases?
The US lost its attempt to extradite Lauri Love to face hacking charges in a landmark case. What will it mean for other UK citizens facing extradition? Continue Reading
-
Who do you trust to censor social media?
Calls to censor Facebook and its rivals are growing – but society needs to consider carefully the motivations of those making such demands Continue Reading
-
Security Think Tank: Cryptojacking can be costly
How can organisations best defend against cryptojacking? Continue Reading
-
Security Think Tank: Six tips for securing your organisation against cryptojacking
How can organisations best defend against cryptojacking? Continue Reading
-
IoT security cannot be an afterthought: it must be the foundation of design
As technologies for the internet of things mature, developers need to make security by design a fundamental part of their products Continue Reading
-
Why businesses must think like criminals to protect their data
Cyber criminals use three main methods of operation to steal commercial data. Understanding their mindset can help organisations put the right defences in place Continue Reading
-
Security Think Tank: Deal with cryptojacking to avoid security vulnerability
How can organisations best defend against cryptojacking? Continue Reading