off

Risk Management: Upgrading the Approach to Access Control

‘If it ain’t broke, don’t fix it’ is a mantra that often describes the best course of action for many situations in life, writes Nick Smith. It’s a phrase that’s probably best suited to something like a bookcase or an oven, but it also often describes the...
Posted On 04 Mar 2019
Paul Darby
off

Outdated VPN Remote Access: Putting CNI Organisations at Risk

When Virtual Private Networks (VPNs) were first developed back in the 1990s, the idea was to extend the LAN to employees’ home offices and hotels as they hit the road. This meant giving employees remote access to everything their company network had to offer, just as if...
Posted On 16 Jul 2018
off

BSIA Working Group members pledge to “lead the way” in cyber security education

Protecting customers from the risk of product-related cyber crime was the focus of the inaugural meeting of a new Working Group convened by the British Security Industry Association (BSIA). Members of the Cyber Security Product Assurance Group (CySPAG) have met for the first time...
Posted On 17 Mar 2017
off

Simulated investigation staged at BT Tower in bid to unearth cyber recruits

Telecoms giant BT and the Cyber Security Challenge UK have staged a mock investigation into a cyber attack at London’s iconic BT Tower in a bid to find the country’s best hidden cyber security talent. No fewer than 24 of the brightest candidates from a series of online qualifying...
Posted On 26 Apr 2016
Dean Kernot
off

Access Control: Is ‘The Cloud’ a Genuine Alternative?

For so long now, access control solutions have been broken down into two distinct types – namely networked or stand-alone – and this has served the market pretty well. However, as end user needs and requirements change with time, we need to ask ourselves whether cloud...
Posted On 26 Jan 2016
Paul German
off

“Another day, another hack”: the TalkTalk breach under the microscope

Yet another breach has hit the hacking headlines, but are we surprised? Too many high-profile breaches have been under speculation so far this year, and businesses are still failing to put proper security measures in place to not only make their systems more difficult to hack,...
Posted On 26 Oct 2015
off

Gateway to Data Security

An explosive growth in cloud applications has dramatically changed the security architecture enterprises need to protect themselves. As a result, those same enterprises are realising they must re-assess their states of security, privacy and compliance such that they can be ‘cloud...
Posted On 10 Jan 2015