Alan Calder
off

People and Processes: The Key Drivers for Effective Cyber Security

Cyber security investment continues to spiral, with Gartner predicting that global security spend will reach £71.72 billion by the end of the year as a direct result of regulatory change, mindset and a growing awareness of threats, writes Alan Calder. With over 40% of UK...
Posted On 09 Nov 2018
off

Staying Secure in the Digital Realm: Understanding The Cyber Threat Landscape

In early July, IBM Security and The Ponemon Institute released the ‘Cost of a Data Breach’ Study in which it was reported that the global average cost of a data breach and the average cost for lost or stolen information have both increased. The former is up by 6.4% to...
Posted On 07 Nov 2018
Ragnar Schierholz
off

Industrial Control System Cyber Incidents: Lessons to be Learned

Despite modern automation, protection and control systems being highly specialised IT systems, many use commercial off-the-shelf components along with standardised IP-based communication protocols. In addition, they can be distributed and highly interconnected systems that use...
Posted On 31 Oct 2018
Paul Kennedy
off

Digital Evidence Management in the Police Service: Room for Improvement?

British statesman Sir Robert Peel introduced the first-ever police force – the Metropolitan Police Force of London – way back in 1829 during his tenure as Home Secretary in the Conservative Government of the day. The Met was tasked with detecting and preventing crime....
Posted On 22 Oct 2018
Stephen Smith
off

The Relentless March of the Cybermen

Cyber security is the protection of Internet-connected systems – including hardware, software and data – from cyber attacks. In a computing context, security comprises cyber security and physical security. Both are used by enterprises to protect against unauthorised...
Posted On 09 Oct 2018
Ashley Lane
off

Digital Forensics: Restoring Authority to Human Resources Departments

Where Human Resources (HR) and IT Departments engage in a common cause, the outcomes can be immensely beneficial for the host organisation, and especially so in large organisations and wherever there’s a premium put on the use of sophisticated systems an...
Posted On 27 Sep 2018
Uri Guterman
off

SD Cards: The Unsung Heroes of Video Surveillance

SD cards are small and tucked away, but we should never take them for granted as they can make a significant contribution towards end users achieving maximum benefit from their video surveillance systems. Here, Uri Guterman sings the praises of SD cards and provides some...
Posted On 24 Sep 2018
off

Why Today’s CEOs Must Pay Attention to Security Programmes

There are various questions CEOs should be asking their teams when it comes to cyber security. Some of them concentrate on how organisations are managing risks, the evolution of the budget and understanding the Top Five risks (or high-risk areas) within the business. Here, Rick...
Posted On 18 Sep 2018
Joe Sullivan
off

Why Risk Managers Are Suddenly Interested in Property Portfolios

Risk managers have a new weapon in their arsenals – real estate. The use of property strategy as a tool for risk management is a relatively new trend, writes Joe Sullivan, but it’s one that’s expected to see significant growth as more businesses understand the new...
Posted On 07 Sep 2018
Jeremy Fleming: director of GCHQ
off

Securing the Next Generation of Technology

Here, Jeremy Fleming writes about the unparalleled opportunities and challenges we face as the world becomes ever more digitally connected. With the globalisation of technology, Fleming explains how GCHQ will continue to work with businesses, technology companies, academia and...
Posted On 28 Aug 2018