When do-it-yourself IT security no longer does

The complexities and continuous evolvement of IT security threats have made managing them a specialist field. With cloud services, third party applications and mobile devices proliferating the workplace, nobody without the necessary experience, technical skills or...

Staying secure in the mobile-first, cloud-first era

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud computing, big data analytics, and the Internet of Things. Consequently, the security landscape has also undergone significant change in the last few...

10 reasons why cybercriminals target smartphones

Smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday existence easier and more enjoyable. But, while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger...

Get the most out of your surveillance cameras

Recently, there has been much discussion about the differences between (and resulting advantages of) thermal cameras and traditional visual cameras for surveillance purposes, writes Laurence Smith, executive at Graphic Image Technologies. Visual cameras use light to...

Proactively defending your network

Cyber attacks occur with increasing speed and sophistication. Advanced persistent threats (APTs) that are tailored to infiltrate a network and target specific information are a reality, and are only going to become more pervasive. In today’s world of the...

Staying secure in the mobile-first, cloud-first era

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud computing, big data analytics, and the Internet of Things. Consequently, the security landscape has also undergone significant change in the last few...