off

Rewriting The Script

Copyright infringement of software – also known as software piracy – is an ever-increasing problem for the UK’s software community. As Jamie Longmuir states, this form of criminality is difficult to trace, can be even harder to prevent and, if truth be told, is almost impossible...
Posted On 10 Dec 2014
off

Digital Evidence: Eradicating the pessimism

Mobile forensics have the potential to transform traditional methods of profiling offenders and build a comprehensive picture of suspects. Yuval Ben-Moshe outlines the importance of social data and why the evidence it can provide deserves greater traction among the legal system...
Posted On 10 Nov 2014
off

Changing the culture of ‘cyber’

There are magnificent examples of organisations succeeding at cyber security in an environment where most others are failing – and they have done so without any extra investment. The $64,000 question is: How? As Martin Smith states, it’s all about culture change from within...
Posted On 10 Oct 2014
off

What’s behind your cloud?

Who’s running the data centres for your business? Where are they located and what applications and data are held in situ? When assessing the suitability of Disaster Recovery as a Service provision, Alex Rabbetts examines why security and risk professionals ought to be conducting...
Posted On 10 Sep 2014
off

Bring Your Own Device: The Security Checklist

With personal mobile devices now increasingly accessing the corporate network, security, IT and risk managers are faced with a huge logistical challenge: how to protect the business infrastructure and its valuable data. Anders Lofgren offers them some timely advice. Very few of...
Posted On 10 Aug 2014