Tag "Information Security"

Back to homepage
Industry Insights

Hack like a CISO

Developing the security officers’ processes, strategies and techniques for managing their time, resources and teams.I have written several times over the last couple of years about how the role of

Hardware/Network

Five network security threats facing retail – and how to fight them

Digital networks are now the backbone of every retail operation. But they are also a very attractive target for cyber criminals. Paul Leybourne of Vodat International examines the key cyber

Hardware/Network

Shrouding IoT Security in the Fog

The world is undergoing the most dramatic overhaul of our information service infrastructure ever, driven by the “connected everything” movement.While the benefits of connected data are indisputable – better decisions

Hardware/Network Mobile

Protecting a Mobile Workforce with Hybrid DNS Security

It is expected that half of the UK’s workforce will be working remotely by 2020, accessing the corporate network via mobile devices and the cloud. If true, this prediction is likely to

Industry Insights

White House Cybersecurity Strategy at a Crossroads

Fallout from a rapid-fire series of developments surrounding the 2016 election hacking and meddling by Russia continued today as President Donald Trump attempted to walk back his public dismissal yesterday

Software

Organisations need a zero trust model for cyber security, Unisys survey finds

New research from Unisys Corporation found that IT professionals reported three incidents on average where sensitive information had been lost last year, with some respondents reporting 11 losses for the year. Respondents

Software

Five Steps to Security Automation

Two weeks ago, Volvo, the Swedish automaker, announced plans for a Level 4 self-driving car by 2021. In the progression of automation levels for cars, as outlined by the National Highway Traffic

Software

File-Based Malware: Considering A Different And Specific Security Approach

The cybersecurity solutions landscape has evolved from simple but effective signature-based scanning solutions to sandboxing—the isolating layer of security between your system and malware—and, most recently, to sophisticated detection methods.

Industry Insights

Could understanding the technical debt hold the key to improving cyber security?

Charl van der Walt, chief security strategy officer at SecureData, explains why a change of thinking is needed to improve cyber security strategies. The most important thing to do is

Hardware/Network IT Compliance

Why Do VPNs Need To Be GDPR Compliant?

The past few months have been abuzz with the EU’s General Data Protection Regulations (GDPR) and how online businesses, including VPN providers, have updated their privacy policies. GDPR is applicable