Expert analysis

How much is your privacy worth?
How much is your privacy worth? Take for example your bank account number, sort code, name, and address. Is it worth more than £25? Well I think that it is and as a result I …

Vendor Security Alliance questionnaire: Starting a security discussion with vendors
The interconnection between major organizations and their many service providers is providing a successful, and often ignored, path through which attackers are penetrating …

DMARC email security is now mandatory for the UK government, what can the enterprise learn?
It’s no secret by now that email has become the number one tool for cyber criminals and fraudsters. Earlier this year the FBI predicted that Business Email Compromise attacks …

Using Big Data for intelligent enterprise security
No industry remains untouched by the potential of Big Data – and the cybersecurity sector is certainly no exception. A recent MarketsandMarkets study predicted the …

Proposed cyber security requirements for New York State seem to be more of the same
This month, New York State Governor Andrew Cuomo announced proposed regulation that requires banks, insurance companies, and other financial services institutions regulated by …

Security startup confessions: Hiring and firing
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

Clear and present danger: Combating the email threat landscape
Like it or loathe it, email is here to stay. Despite the ubiquity of file sharing services like OneDrive and Google Docs, email remains a fast and convenient way for users to …

Mobile security stripped bare: Why we need to start again
We’re all familiar with the cartoon image of a character stopping a water leak by plugging a finger into the hole, only for another leak to start, needing another finger, and …

Incident response survival guide
All organizations are impacted by a security breach at some point. As the joke goes in the security industry, businesses fall into two categories: those that have been …

Google’s smart search for security
Google made waves this week with the launch of the much-hyped messaging app Allo. The app boasts some impressive features, including embedding Google Assistant into your …

Should you trust your security software?
The complaint that security is broken isn’t new and even industry insiders are joining the chorus. Companies spent an estimated $75 billion last year on security products and …

Why DNS shouldn’t be used for data transport
Malicious DNS tunnelling is a big problem in cybersecurity. The technique involves the use of the Domain Name System (DNS) protocol to smuggle sensitive corporate or personal …