Risk management Corporate resistance – the unspoken IT security risk

Michael Scheffler, AVP EMEA at Bitglass, talks about why companies often lack the motivation to properly address IT security. He …

Insider threat A practical approach to combating insider threats

Shareth Ben, Insider Threat SME at Securonix, discusses insider threats. He also provides recommendations on how organisations can implement insider …

Information Security A guide to DNS Search Suffix Wi-Fi attacks

Wicus Ross, Lead Security Researcher, and Lauren Rudman, Junior Security Researcher, SecureData, show us how even the most security-savvy employees …

Information Security Lagging behind: why government organisations need to upgrade their email security

Maor Hizkiev, CTO and co-founder, BitDam, explains how and why government organisations are lagging behind in implementing standard email security …

Information Security How to manage network security efficiently

Todd Kelly, Chief Security Officer, Cradlepoint, offers a variety of measures to keep your networks safe  Network security needs are …

Network security How to manage shadow IoT and mitigate the risks to network security

Vendor View: Gary Cox, technology director, Western Europe, Infoblox shows us how to manage shadow IoT and mitigate the risks to …

Information Security U.S. mulling development of nationalised 5G network to restrict Chinese spying

The Trump administration is considering the development of a nationalised 5G network which will keep citizens' data secure from the …

News Worldwide spending on cyber-security to exceed $1 trillion by 2022

Worldwide spending on cybersecurity products and services may eclipse $1 trillion between 2017 and 2022, says a conglomerate of cyber-security …