Staying secure in the mobile-first, cloud-first era

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud computing, big data analytics, and the Internet of Things. Consequently, the security landscape has also undergone significant change in the last few...

10 reasons why cybercriminals target smartphones

Smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday existence easier and more enjoyable. But, while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger...

Get the most out of your surveillance cameras

Recently, there has been much discussion about the differences between (and resulting advantages of) thermal cameras and traditional visual cameras for surveillance purposes, writes Laurence Smith, executive at Graphic Image Technologies. Visual cameras use light to...

Proactively defending your network

Cyber attacks occur with increasing speed and sophistication. Advanced persistent threats (APTs) that are tailored to infiltrate a network and target specific information are a reality, and are only going to become more pervasive. In today’s world of the...

Staying secure in the mobile-first, cloud-first era

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud computing, big data analytics, and the Internet of Things. Consequently, the security landscape has also undergone significant change in the last few...

Security and IoT: can they be compatible?

Robert Miller, head of operational technology at MWR InfoSecurity, unpacks the topic of security in the Internet of Things (IoT) environment. In a world of interconnected devices, it can be all too easy for consumers and businesses alike to focus purely on the...