Opinion
Opinion
Network security strategy
-
Coronavirus: What does the ‘new normal’ mean for how we work?
Examining the long-term impact of the Covid-19 coronavirus pandemic on the world of work, security, privacy and networks Continue Reading
-
Security Think Tank: How zero trust lets you take back control
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero trust ... Continue Reading
-
Security Think Tank: Practical steps to achieve zero trust
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust ... Continue Reading
-
Security Think Tank: In-depth protection is a matter of basic hygiene
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Space – the new frontier in cyber security
50 years after the Moon landings, our growing reliance on satellite communications presents a new target for malicious cyber attacks Continue Reading
-
Everyone, everywhere is responsible for IIoT cyber security
Cyber security in the industrial internet of things is not limited to a single company, industry or region – it is an international threat to public safety, and can only be addressed through collaboration that extends beyond borders and competitive ... Continue Reading
-
Why the government should rethink the UK’s surveillance laws
The European Court of Human Rights has made clear that the Snoopers’ Charter is an unlawful violation of people’s rights and freedoms Continue Reading
-
Beyond GDPR: ePrivacy could have an even greater impact on mobile
From how we monitor air pollution and manage our public transport systems, to how we enable connected cars and the next generation of 5G mobile services, the forthcoming ePR could have a lasting impact on European society Continue Reading
-
Hacking the internet of things just got easier – it’s time to look at your security
Are you taking security for internet-connected devices seriously enough? Continue Reading
-
IoT security cannot be an afterthought: it must be the foundation of design
As technologies for the internet of things mature, developers need to make security by design a fundamental part of their products Continue Reading
-
Why police forces need to be honest about mass mobile phone surveillance
Police forces across the UK are covering up their use of sophisticated mass surveillance devices, known as IMSI-catchers - the Bristol Cable and Liberty are campaigning for proper transparency Continue Reading
-
Europe’s shameful role in spy-tech exports that led to torture and jail
Governments in Europe actively assisted in government oppression in Iran, Bahrain and Russia by providing states with sophisticated surveillance equipment. The European Parliament is pressing for changes in the law to restrict exports of ... Continue Reading
-
Security Think Tank: Encourage employees to use an approved messaging app
What criteria should organisations use to assess the security of smartphone messaging apps and how can they ensure only approved apps are used by employees? Continue Reading
-
My brother Lauri Love should have the right to a trial in the UK
Lauri Love should face trial over hacking allegations in a British Court, rather than be extradited to the US, where his extraordinary skills will be lost to society, says his younger sister Continue Reading
-
A guide for businesses to China’s first cyber security law
Companies that break China’s new cyber security law may be fined or even have their licence to trade in the country removed Continue Reading
-
Passive optical LAN: When network speed, bandwidth and security matter
Copper-based local area networks are increasingly unfit for purpose in a digital enterprise, but passive optical LANs may be a solution. Tech evangelist Paul Ryan, European chair of the Association of Passive Optical LAN, explains why Continue Reading
-
IoT is good news for hackers
Technology companies, governments and the insurance industry need to band together to counter the mounting cyber threats from the internet of things Continue Reading
-
Storm clouds gather for US-EU Privacy Shield data deal
The European Parliament justice committee launches unprecedented criticism of Privacy Shield, while the Irish Court mulls future of binding corporate contracts Continue Reading
-
Finance firms are vulnerable to cyber attacks, so why do customers think they are secure?
The public are overly confident in the ability of banks and financial institutions to protect their data, but that will change when mandatory reporting comes in next year under the General Data Protection Regulation Continue Reading
-
The politics of things: Policymakers must help shape the IoT
Saverio Romeo, principal analyst at Beecham Research, explores the role of policymakers in the rapidly expanding internet of things Continue Reading
-
Fight against Investigatory Powers Bill may not be over
Labour's shadow home secretary Diane Abbott says that wider society must now debate the controversial Investigatory Powers Bill, despite Parliamentary approval Continue Reading
-
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon Continue Reading
-
Investigatory Powers Bill – the case for mass surveillance
As the Investigatory Powers Bill goes through its final stages in Parliament, a former GCHQ intelligence officer puts the case for the bulk surveillance powers contained in the legislation Continue Reading
-
A Good American: a personal take on mass surveillance
Director Friedrich Moser draws some conclusions on mass surveillance from his groundbreaking documentary on the work of NSA whistleblower, Bill Binney Continue Reading
-
Prism and the law: The state of play in August 2016
Computer Weekly assesses the history, legal aspects and latest developments in the story of the mass surveillance programme launched by the US National Security Agency Continue Reading
-
Data breaches: Different regions, very different impacts
The cost, scrutiny and pressure of dealing with a data breach will become more apparent in the near future as European legislation takes effect Continue Reading
-
Government must listen to tech sector in Investigatory Powers Bill
Plans for new powers to allow intelligence agencies to monitor electronic communications must be carefully thought through Continue Reading
-
Network security systems – dedicated or multifunction?
For small and medium-sized businesses looking to secure their networks, multifunction security systems are a better option than best-of-breed technology Continue Reading
-
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
-
Three things you may not know that DNS data can tell you
Big data tools can help network administrators gather new insights into security and performance from DNS data Continue Reading
-
What to expect from Europe’s NIS Directive
With cyber crime on the rise, the European Union is trying to fight back with its NIS Directive. The five main points are oulined here Continue Reading
-
PSN makes changes to reduce risk
Director and head of compliance, PSNGB, Adele Parker, talks about how PSN will transport the bulk of government information Continue Reading
-
Making the case for network modernisation
It's time to break out of reactive investment mode, says Dale Vile, research director at analyst group Freeform Dynamics Continue Reading
-
Opinion: Enterprise Networks – Where do IT pros see challenges?
The challenges placed on IT grow more demanding each day Continue Reading
-
Should you allow a bring your own device policy?
Employers are realising there are challenges presented by BYOD which, if not dealt with, could have a serious impact on the business Continue Reading
-
C’mon guys – don’t bottle up the Public Services Network; release it
There is a stark choice between a PSN that has a customer-centric approach to security or one with a locked-down security framework Continue Reading
-
Laying the iOS 6 Foundation
The main purpose of Apple's purchase of NeXT in the 1990s was to obtain the operating system that was to become today's OS X and iOS Continue Reading
-
Is the smart meter programme really doomed? Don’t panic...
The UK's £11bn smart meter roll-out has been heavily criticised - but is it really the disaster in the making that it has been portrayed? Continue Reading
-
Near field communication (NFC): Latest shockwave of the technological invasion
By Vedak Coskun, co-author of "Professional NFC Application Development for Android" Continue Reading
-
How IT security can drive business and enable innovation
The most critical IT security challenge is to be able to see the whole picture, understand the business needs and find solutions Continue Reading
-
The history of the next-generation firewall
Security expert Rik Ferguson explains how next-generation firewalls were developed and what protection they provide businesses. Continue Reading
-
Security Think Tank: Flame shows why risk management is a business essential
What can enterprise learn from initial analysis of Flame malware? Continue Reading
-
Tackling the challenges of the next-generation firewall
Security expert Brian Honan shares top tips on installing and maintaining a next-generation firewall Continue Reading
-
Security Think Tank: Are companies too confident about targeted attacks?
What can enterprise learn from initial analysis of Flame? Continue Reading
-
Security Think Tank: Flame a good reason to keep up with emerging threat analysis
What can the enterprise learn from the initial analyses of the Flame malware? Continue Reading
-
Security Think Tank: Flame is an opportunity for businesses to reassess defences
What can enterprise learn from initial analysis of Flame? Continue Reading
-
Security Think Tank: Flame – business must prepare for the unpredictable
What can enterprise learn from initial analysis of Flame? Continue Reading
-
Security Think Tank: The only sustainable approach to security is intelligence-led
What should organisations be doing to benefit from the move to intelligence-led security? Continue Reading
-
Security Think Tank: Intelligence-led security demands planning ALREADY USED
What should organisations be doing to benefit from the move to intelligence-led security? Continue Reading
-
Security Think Tank: Intelligence-led security could give IT pros the edge
What should organisations be doing to benefit from intelligence-led security? Continue Reading
-
Security Think Tank: Proof of intelligence-led security is in the metrics
What should organisations do to fully exploit intelligence-led security? Continue Reading
-
Security Think Tank: Using big data for intelligence-led security
How can organisations use big data to yield hidden information of benefit to intelligence-led security? Continue Reading
-
Security Think Tank: RASP – a must-have security technology
What should organisations be doing to benefit from the move to intelligence-led security? Continue Reading
-
Security Think Tank: Intelligence-led security is about risk management
What should organisations be doing to benefit from move to intelligence-led security? Continue Reading
-
Security Think Tank: Intelligence-led security is more efficient and effective
What should organisations be doing to benefit from move to intelligence-led security? Continue Reading
-
Security Think Tank: Security intelligence needs a plan
What should organisations be doing to benefit from the move towards intelligence-led security? Continue Reading
-
Security Think Tank: Three considerations to outsourcing IT security
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: Outsourcing of IT security is not for everyone
What should and what should not be outsourced in IT security? Continue Reading
-
Network prediction: Has the networking industry changed in a decade?
Network architect and Ethereal Mind blogger Greg Ferro reflects on how little has changed over ten years in his latest network prediction for the UK. Network security risks remain problematic Continue Reading