off

Data Centres: Tomorrow’s Targets for Terrorism?

In light of recent events including the DDoS cyber attacks on Sony Corporation’s PlayStation and Entertainment networks, one prime area for reassessment by security and IT professionals just now is that of data security. Not just online safety from the perspective of the...
Posted On 10 Feb 2015
off

Gateway to Data Security

An explosive growth in cloud applications has dramatically changed the security architecture enterprises need to protect themselves. As a result, those same enterprises are realising they must re-assess their states of security, privacy and compliance such that they can be ‘cloud...
Posted On 10 Jan 2015
off

Rewriting The Script

Copyright infringement of software – also known as software piracy – is an ever-increasing problem for the UK’s software community. As Jamie Longmuir states, this form of criminality is difficult to trace, can be even harder to prevent and, if truth be told, is almost impossible...
Posted On 10 Dec 2014
off

Digital Evidence: Eradicating the pessimism

Mobile forensics have the potential to transform traditional methods of profiling offenders and build a comprehensive picture of suspects. Yuval Ben-Moshe outlines the importance of social data and why the evidence it can provide deserves greater traction among the legal system...
Posted On 10 Nov 2014
off

Changing the culture of ‘cyber’

There are magnificent examples of organisations succeeding at cyber security in an environment where most others are failing – and they have done so without any extra investment. The $64,000 question is: How? As Martin Smith states, it’s all about culture change from within...
Posted On 10 Oct 2014
off

What’s behind your cloud?

Who’s running the data centres for your business? Where are they located and what applications and data are held in situ? When assessing the suitability of Disaster Recovery as a Service provision, Alex Rabbetts examines why security and risk professionals ought to be conducting...
Posted On 10 Sep 2014
off

Bring Your Own Device: The Security Checklist

With personal mobile devices now increasingly accessing the corporate network, security, IT and risk managers are faced with a huge logistical challenge: how to protect the business infrastructure and its valuable data. Anders Lofgren offers them some timely advice. Very few of...
Posted On 10 Aug 2014