Please turn on your JavaScript for this page to function normally.
talk speak speaker
Vendor Security Alliance questionnaire: Starting a security discussion with vendors

The interconnection between major organizations and their many service providers is providing a successful, and often ignored, path through which attackers are penetrating …

email
DMARC email security is now mandatory for the UK government, what can the enterprise learn?

It’s no secret by now that email has become the number one tool for cyber criminals and fraudsters. Earlier this year the FBI predicted that Business Email Compromise attacks …

Big Data
Using Big Data for intelligent enterprise security

No industry remains untouched by the potential of Big Data – and the cybersecurity sector is certainly no exception. A recent MarketsandMarkets study predicted the …

New York State
Proposed cyber security requirements for New York State seem to be more of the same

This month, New York State Governor Andrew Cuomo announced proposed regulation that requires banks, insurance companies, and other financial services institutions regulated by …

business
Security startup confessions: Hiring and firing

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

email
Clear and present danger: Combating the email threat landscape

Like it or loathe it, email is here to stay. Despite the ubiquity of file sharing services like OneDrive and Google Docs, email remains a fast and convenient way for users to …

mobile
Mobile security stripped bare: Why we need to start again

We’re all familiar with the cartoon image of a character stopping a water leak by plugging a finger into the hole, only for another leak to start, needing another finger, and …

firefighters
Incident response survival guide

All organizations are impacted by a security breach at some point. As the joke goes in the security industry, businesses fall into two categories: those that have been …

Google Allo
Google’s smart search for security

Google made waves this week with the launch of the much-hyped messaging app Allo. The app boasts some impressive features, including embedding Google Assistant into your …

Trust
Should you trust your security software?

The complaint that security is broken isn’t new and even industry insiders are joining the chorus. Companies spent an estimated $75 billion last year on security products and …

traffic
Why DNS shouldn’t be used for data transport

Malicious DNS tunnelling is a big problem in cybersecurity. The technique involves the use of the Domain Name System (DNS) protocol to smuggle sensitive corporate or personal …

GCHQ
Can an automated defence network protect Britain from low-level threats?

A recent Freedom of Information request found that the number of breaches reported to the ICO in the last 12 months has nearly doubled from the previous year, so something …

Don't miss

Cybersecurity news