As breaches become the norm, a more realistic approach is to create a strong incident response process and team. Tom Cross gives his tips for a successful incident response effort.
An amendment to the Computer Misuse Act 1990 ensure sentences for attacks on computer systems fully reflect the damage they cause.
As former cyber-security coordinator for the Obama administration, adviser to two presidents and consultant with Microsoft and the air force, Howard Schmidt is uniquely placed in cyber security.
The Information Commissioner’s Office has issued a new report which highlights the biggest security mistakes organisations make when it comes to leaking data.
More threats are emerging, and according to Infosec attendees, the biggest danger to a company’s security is social engineering attacks.
FireEye’s fifth Mandiant M-trends security report details some revealing statistics concerning network intrusion and phishing emails.
Since the devastating breach that hit Adobe last year, they've been overhauling their whole system. Here's how they went about it, and how you can do the same with your business.
Protiviti has highlighted some major issues with its latest IT Security and Privacy Survey, including a lack of proper data and encryption policies.
Are UK SMEs failing to properly train staff on how to stop critical cyber breaches?
According to a recent survey at this year's Infosecurity Europe 36 per cent of IT staff send sensitive information externally without any form of data encryption.
The head of cybersecurity operations at the White House has revealed that he doesn't believe that his lack of a deep level of IT knowledge gives him an edge in his field.
1