Organizations are increasingly under pressure to respond to security incidents quickly in order to minimise damage and losses. Yet conventional security approaches don't always provide enough information, or make it accessible enough, for this to happen.
Is it time for businesses to take a more forensic approach to securing their networks? And won’t this involve time-consuming trawls through masses of raw packet data? We spoke to Uriel Cohen, head of marketing at network forensics specialist WireX Systems to find out.
Anybody can develop a mobile app, but making money out of it is another matter. Accepting adversing is a popular route but it involves linking the app to a specific network and that means making code changes if you decide to switch at a later date.
Estonian company MoneyTap is aiming to change that and put the developer in control. We spoke to the company's business development manager Pavel Goryakin to find out how.
Industrial control systems like those used to run the electricity distribution grid are vital to the economic well being of any country. But protecting those systems needs a different approach from normal enterprise security.
In the US the North American Electric Reliability Corporation (NERC) is the body charged with ensuring grid reliability. But the NERC's critical infrastructure protection (CIP) standards call for only standard firewall use. Is this putting the grid at risk from hackers or terrorists? We spoke to Andrew Ginter, vice president of industrial security at Waterfall Security Solutions to find out more.
Spending on Platform-as-a-Service (Paas), Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) is forecast to reach $118 billion this year, and it's clear the cloud is now big business. Companies are fighting to enter the space with new industry- and marketing-specific offerings. But what effect will this have and will it worry the big players like Amazon Web Services?
We spoke to Scott Swartz, VP, CTO Enterprise and Cloud Billing at Ericsson and founder of MetraTech, an enterprise billing specialist recently acquired by Ericsson, to find out more about the state of the IaaS space.
With more and more companies storing apps in the cloud and others remaining in-house, security can become something of a headache. On-site security tools are ineffective against web attacks leaving organizations with multiple protection solutions in place.
The launch of hybrid cloud solutions such as Radware's WAF (Web Application Firewall) means it’s possible to protect all systems with just one application but what implications does this have for the enterprise? We spoke to Carl Herberger, VP of Security Solutions at application delivery and security specialist Radware to find out more about the benefits of hybrid WAF solutions and how they can be implemented.
Most security researchers now acknowledge that it is only a matter of time before a business suffers some form of compromise as the bad guys follow the money and conventional security tools struggle to keep pace. A recent report from Gartner stresses the need for apps to become self protecting rather than rely on security tools.
But how easy is it to produce a self-protecting app and how effective are they against malware? We spoke to Gordon Young, UK Sales Director of security specialist Promon to find out more.
Most of the hype around online marketing these days seems to revolve around using social media, big data and other tools to predict what the customer wants.
It would be easy to assume that outbound marketing techniques like email campaigns have become a bit last century, but Victoria Godfrey, chief marketing officer at B2B data provider Avention thinks otherwise. We spoke to her to find out why.
More and more businesses are moving their data to the cloud and adopting SaaS delivery models for software. In making this switch many assume that they're shifting the responsibility for looking after their data to someone else.
But companies still need to take charge of looking after their information. We spoke to Rob May, senior vice president of business development for Datto to find out more about how enterprises can protect themselves.
Data leaks due to security flaws and hacker activity constantly make the news, but they're not the only ones that businesses have to worry about. Leaks can stem from employee or industrial espionage activity too and of course there's always government snooping.
Whilst larger businesses with sensitive data or intellectual property to protect often check for old-style surveillance they may not be as aware of the potential for PCs and other gadgets to gather intelligence as well as leak data. We spoke to Andre Ross, Director of Australian digital forensics and information security company Elvidence to find out how businesses may be at risk and what they can do to combat it.
Microsoft’s HoloLens, and the Google-backed Magic Leap might be touted as the future of augmented reality wearables, but electronics giant Epson has beaten both firms to the punch. Its own AR smart glasses are already on the market and finding an appreciative audience among gamers, movie watchers, businesses, and even the registered blind.
I spoke with Valerie Riffaud-Cangelosi. Epson’s New Market Development Manager, about the Japanese firm’s venture into augmented reality, and its plans for the future.
The Apple Watch was announced just a couple of days ago, and the focus has been very much on the hardware so far. But battery life and the amount of storage aside, this is an Apple product, and that means apps are central to its success. Just like the iPhone and iPad, the Apple Watch is a platform on which developers can work their magic.
One such developer is Christoph Burgdorfer, the man behind -- amongst other things -- WhereAreYou App (Locate a friend), a free app that does very much what it says on the tin. It started life as an iPhone and Android app, but the emergence of Apple Watch opens up another possibility. I caught up with Christoph to chat about what it was like to develop for an unreleased product, and whether Apple got it right with the Apple Watch.
It feels as if everything is turning to a subscription or "... as-a-service" business model. Just last week I was told about an app that offers (and I kid you not) "Laundry-as-a-Service". To help you and I understand the trend and figure out how your business can take advantage of it I got in contact with Louis Hall, CEO of Cerillion.
In this interview Louis and I get to the bottom of how and why businesses can and should take advantage of the subscription model and exactly why it’s become so popular.
In the past malware developers and hackers have tended to concentrate on Windows. But as mobile has taken off and there's been a shift in the type of systems people use they've diversified their efforts into other systems.
In particular Android, as the most popular mobile OS, has become a prime target. We spoke to Huan Ren, chief architect at Android security and performance specialist 360 Security to get his view of the mobile security landscape.
One of the biggest trends of this year's CES was the "Health of Things", with wearable technology increasingly being connected to healthcare in order to enhance users' lives.
I spoke to health tech specialist Nudge about what exactly the "Health of Things" means to the general consumer and the impact it's having -- and will have -- on the tech and healthcare industries.
Last year saw a number of high profile security incidents hit businesses. From attacks on individual companies to bugs like Heartbleed that had the potential to affect large numbers of organizations.
Can we expect more of the same in 2015 or will the threat landscape continue to evolve? We spoke to Mark Bermingham, director of global B2B marketing at Kaspersky Lab, to find out.