off

Rewriting The Script

Copyright infringement of software – also known as software piracy – is an ever-increasing problem for the UK’s software community. As Jamie Longmuir states, this form of criminality is difficult to trace, can be even harder to prevent and, if truth be told, is almost impossible...
Posted On 10 Dec 2014
off

Secure transition to civilian life

With 2014 marking the centenary of the outbreak of World War I, the long-term impact of war and conflict on those fighting at the front line has once more become part of the nation’s collective consciousness. Trevor Elliott discusses the career challenges often faced by those...
Posted On 10 Dec 2014
off

Digital Evidence: Eradicating the pessimism

Mobile forensics have the potential to transform traditional methods of profiling offenders and build a comprehensive picture of suspects. Yuval Ben-Moshe outlines the importance of social data and why the evidence it can provide deserves greater traction among the legal system...
Posted On 10 Nov 2014
off

University challenge

What are the main issues at play on site when a security company takes over a contract where the incumbent provider has been in place for some time, and how might the new solutions team realise positive change for the end user? Neill Catton examines CIS Security’s strategy at...
Posted On 10 Nov 2014
off

Changing the culture of ‘cyber’

There are magnificent examples of organisations succeeding at cyber security in an environment where most others are failing – and they have done so without any extra investment. The $64,000 question is: How? As Martin Smith states, it’s all about culture change from within...
Posted On 10 Oct 2014
off

Pathways for progression

Professional benchmarks for certain security roles are not always readily available on the wider scale. This can create barriers to progression for employees and, in doing so, continues to hinder efforts targeted at both altering external perceptions of the security business...
Posted On 10 Oct 2014
off

What’s behind your cloud?

Who’s running the data centres for your business? Where are they located and what applications and data are held in situ? When assessing the suitability of Disaster Recovery as a Service provision, Alex Rabbetts examines why security and risk professionals ought to be conducting...
Posted On 10 Sep 2014
off

Time to reinvent security

Following the economic downturn there has been a paradigm shift in the security sector. It’s no longer enough to provide ‘security’ amounting to little more than a licensed officer managing an access control point. Lewis Roberts explains why adding value must be the name of the...
Posted On 10 Sep 2014
off

Bring Your Own Device: The Security Checklist

With personal mobile devices now increasingly accessing the corporate network, security, IT and risk managers are faced with a huge logistical challenge: how to protect the business infrastructure and its valuable data. Anders Lofgren offers them some timely advice. Very few of...
Posted On 10 Aug 2014