off

University challenge

What are the main issues at play on site when a security company takes over a contract where the incumbent provider has been in place for some time, and how might the new solutions team realise positive change for the end user? Neill Catton examines CIS Security’s strategy at...
Posted On 10 Nov 2014
off

Changing the culture of ‘cyber’

There are magnificent examples of organisations succeeding at cyber security in an environment where most others are failing – and they have done so without any extra investment. The $64,000 question is: How? As Martin Smith states, it’s all about culture change from within...
Posted On 10 Oct 2014
off

Pathways for progression

Professional benchmarks for certain security roles are not always readily available on the wider scale. This can create barriers to progression for employees and, in doing so, continues to hinder efforts targeted at both altering external perceptions of the security business...
Posted On 10 Oct 2014
off

What’s behind your cloud?

Who’s running the data centres for your business? Where are they located and what applications and data are held in situ? When assessing the suitability of Disaster Recovery as a Service provision, Alex Rabbetts examines why security and risk professionals ought to be conducting...
Posted On 10 Sep 2014
off

Bring Your Own Device: The Security Checklist

With personal mobile devices now increasingly accessing the corporate network, security, IT and risk managers are faced with a huge logistical challenge: how to protect the business infrastructure and its valuable data. Anders Lofgren offers them some timely advice. Very few of...
Posted On 10 Aug 2014