All articles by Cbr Rolling Blog
Breach of the peace
Why physical documentation is as much at risk of data breaches as digital – and what your business can do about it.
How to Create More Secure IoT Devices
Dan Lyon, Senior Consultant and Amit Sethi, Principal Consultant, Cigital, looks at the inherent design constraints and security risks in creating safe software for the IoT.
Don’t Dive In: Knowing the Costs of the Cloud
Zahl Limbuwala, CEO, Romonet highlights the need for businesses to understand the costs of the cloud before making the move.
The definition of good threat intelligence
Darren Anstee, Chief Security Technologist at Arbor Networks, looks at the many different meanings of ‘threat intelligence’.
Getting to grips with IT manageability
HP’s Neil Anderson talks IT manageability, arguing that both manageability and security should come built-in.
Data Discovery: Worthless without governance?
Peter Baxter, MD EMEA at Yellowfin, discusses the relative merits of Data Discovery.
Windows 10 won’t be the death of passwords
Guillaume Desnoes, Head of European Markets at Dashlane, discusses the security enhancements in the much anticipated Windows 10.
The Convenience of a Data Lake and the Chaos Within
By Soumendra Mohanty, SVP, Global Data and Analytics at Mindtree, looks into the latest method of a data repository.
Old Malware, New Tricks
There’s been an explosion in new malware over the past 2 years. But how new is this malware, really? How serious is the threat, and how should it be countered? Gabi Reish, VP of products for Check Point looks at the issues.
Are you leading wild horses?
Charles Rattray, North American Vice President at Kimble Applications, on how to tame knowledge workers and getting them to pull in the same direction.