Expert analysis
Vendor Security Alliance questionnaire: Starting a security discussion with vendors
The interconnection between major organizations and their many service providers is providing a successful, and often ignored, path through which attackers are penetrating …
DMARC email security is now mandatory for the UK government, what can the enterprise learn?
It’s no secret by now that email has become the number one tool for cyber criminals and fraudsters. Earlier this year the FBI predicted that Business Email Compromise attacks …
Using Big Data for intelligent enterprise security
No industry remains untouched by the potential of Big Data – and the cybersecurity sector is certainly no exception. A recent MarketsandMarkets study predicted the …
Proposed cyber security requirements for New York State seem to be more of the same
This month, New York State Governor Andrew Cuomo announced proposed regulation that requires banks, insurance companies, and other financial services institutions regulated by …
Security startup confessions: Hiring and firing
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
Clear and present danger: Combating the email threat landscape
Like it or loathe it, email is here to stay. Despite the ubiquity of file sharing services like OneDrive and Google Docs, email remains a fast and convenient way for users to …
Mobile security stripped bare: Why we need to start again
We’re all familiar with the cartoon image of a character stopping a water leak by plugging a finger into the hole, only for another leak to start, needing another finger, and …
Incident response survival guide
All organizations are impacted by a security breach at some point. As the joke goes in the security industry, businesses fall into two categories: those that have been …
Google’s smart search for security
Google made waves this week with the launch of the much-hyped messaging app Allo. The app boasts some impressive features, including embedding Google Assistant into your …
Should you trust your security software?
The complaint that security is broken isn’t new and even industry insiders are joining the chorus. Companies spent an estimated $75 billion last year on security products and …
Why DNS shouldn’t be used for data transport
Malicious DNS tunnelling is a big problem in cybersecurity. The technique involves the use of the Domain Name System (DNS) protocol to smuggle sensitive corporate or personal …
Can an automated defence network protect Britain from low-level threats?
A recent Freedom of Information request found that the number of breaches reported to the ICO in the last 12 months has nearly doubled from the previous year, so something …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies