Interviews and analysis from seasoned technology journalists specialising in information security and biometrics. For: CSOs; CISOs; security, network and IT managers; researchers; academics; and, of course, hackers.
Information security is often an afterthought in organisations’ planning and spending. And as a subset of that, Governance, Risk and Compliance (GRC) ...
Healthcare organisations are under attack, facing threats ranging from data breaches to ransomware. At the same time, they are responsible for the car...
If your image of blockchain technology is entirely linked to crypto-currencies like Bitcoin, think again. Patrick Hubbard of SolarWinds explains that ...
Do you worry that there are bad people accessing your networks? If you think your systems have already been compromised you're going to want to know h...
Do too many small and medium-size enterprises (SMEs) believe that security is something only big firms need to worry about? In this interview, Colin T...
Privacy in the digital realm has become a hot topic. There has always been a debate about to what degree law enforcement and intelligence agencies sho...
Is the concept of 'defence in depth' outdated? In this interview, Matt Alderman of Tenable Network Security explains that, while organisations may hav...
A large proportion of software development relies on open source frameworks and libraries. But vulnerabilities like Shellshock and Heartbleed has tarn...
Many organisations are centralising and concentrating their cyber-security efforts in Security Operation Centres (SOCs). The aim is to provide a more ...
Mobile apps have become a focus for cyber-criminals – and that's bad enough. But when the apps that are stealing your personal information are also ha...