If people are the weakest link in your security landscape, how do you strengthen that link?

Just because you’re shifting something to the cloud doesn’t mean you can forget about your…

Disguised as vendor updates or planted in OEM hardware, backdoors are booming, and they’re the…



Having the right access to the right resources in the right context.

The addition of analytics to traditional surveillance takes what was typically a reactive action…

With phishing, whaling, spearing, ransomware, malware and spam, it’s hardly surprising that…



Are we wasting our time worrying about firewalls and patches, when the vast resources of nation…

Modern leaders value open source for its flexibility, which enables them to match their software…

It’s been a long journey to get the office of the Information Regulator up and running, and…