
Cyber insurance: What and why?
High-profile cyber-attacks are fast becoming the norm in modern society, with 2016 being arguably the worst year for major security breaches. National Crime Agency statistics …

By the end of March no one will remember that Microsoft missed a Patch Tuesday
Like the weather in Minnesota, the March Patch Forecast is unpredictable at best. Be prepared for turbulent times interspersed with moments of calm. Will March Patch Tuesday …

How to patch your security blind spots
One of the most challenging – and interesting, and frustrating – aspects of cybersecurity is the sheer unpredictability of industry developments still to come. Sure, analyzing …

Cloud-based databases need new approaches to ensure data security
Interest and adoption of cloud-based databases is ramping up as more companies see the value of moving from traditional on-premise IT infrastructures to off-premise cloud …

U.S. consumers’ views on cybersecurity
To better understand how Americans think about hacker motivations, consumer versus business security responsibilities, ransomware and the political climates impact on the …

Security skills gap? What security skills gap?
After the year we’ve had, it shouldn’t come as a surprise that cybersecurity skills are heavily in demand. Breaches, attacks and incidents have never been far from the …

The anti social network
Let’s be honest. Our online world is judged on how others view us, or as the psychologist Caldini would put it social validation. Want to buy a product? Well how many people …

ENISA says crypto backdoors are a bad idea
“History has shown that technology beats legislation, and criminals are best placed to capitalise on this opportunity,” the European Network and Information …

Network security: A team sport for SMBs
The increased volume and frequency of cyberattacks has made information security an everyday issue of great importance, regardless of your geographical location, industry, …

No more guilt about your lack of innovation in administrative IT
Helpdesks are mired in mundane tasks that are repeated every day – password resets, user account access and account creations, just to name a few. Manual tasks that really …

Why attaching security to each piece of data is critical
Following in Edward Snowden’s footsteps, yet another NSA contractor has leaked highly classified trade secrets and government information. My question to you: Are we really …

How much is your privacy worth?
How much is your privacy worth? Take for example your bank account number, sort code, name, and address. Is it worth more than £25? Well I think that it is and as a result I …