In Depth
In Depth
Hackers and cybercrime prevention
-
How to formulate an effective smartphone security policy
The mobile revolution offers new ways of working, but what are the challenges and how can they be overcome? Continue Reading
-
Computer Weekly / TechTarget IT priorities survey 2012
Learn which IT priorities are at the top of UK IT managers lists for 2012. Coverage from across our network includes cloud, budget cuts, networking, security, disaster recovery and more. Continue Reading
-
Microsoft: Is computing more trustworthy 10 years on?
Microsoft is marking the 10th anniversary of its Trustworthy Computing group (TwC), but has any significant progress been made since 15 January 2002 when Microsoft chairman Bill Gates sent an email memo to all employees, identifying trustworthy ... Continue Reading
-
Security Think Tank: What is the most important nut for infosec to crack in 2012?
What is the most important nut for infosec to crack in 2012? Continue Reading
-
Security Think Tank: Managing security in the cloud
With cloud computing, as with data breaches, it is a question of “when” not “if”, so what practical steps can information security professionals take to manage security compliance in the cloud? Continue Reading
-
Opinion: Firms can’t or won’t address social networking security risks
It's a common refrain: Even companies that are aware of social networking security risks don't do anything about them. Continue Reading
-
Information security superheroes: are we overlooking the obvious?
In these dark days of professional, organised cyber crime and state-sponsored cyber espionage, the world of business is looking for a cyber superhero to save the day. But in the quest for a cyber superhero, business is failing, Lois Lane-like, to ... Continue Reading
-
The security threats of technology ubiquity
The ubiquity of mobile technology and internet-connected devices present new threats and increase the challenges for IT security managers. Continue Reading
-
Socialisation, social engineering, and securing the enterprise
What can and should organisations do to convince and empower IT users to play an active part in protecting data? Continue Reading
-
The top five SME security challenges
Best practice in IT security and compliance for small and medium-sized enterprises (SMEs) is often seen as a "grudge purchase", but SMEs face the same threat as larger organisations - just without their budgets. Continue Reading
-
Compromising emanations: Tactics for electronic surveillance detection
In this article, Royal Holloway MSc student Paul Frankland and Prof. Keith Martin examine how compromising emanations can reveal confidential data. Continue Reading
-
2011 Royal Holloway information security thesis series
This series of articles from recent MSc graduates of the Royal Holloway University of London grapples with a variety of information security topics. Continue Reading
-
InfoSecurity Europe 2011 coverage
Get the latest news and updates from the 2011 InfoSecurity Europe conference. Continue Reading
-
CW Security Think Tank: What’s holding up the cloud?
CW Security Think Tank: Are security concerns and a lack of adequate risk assessment tools the reason SMEs are not adopting cloud computing, or is the real reason something else that security professionals are also in a good position to address? Continue Reading
-
Ranking the global cyberthreat, IT infrastructure risks
What's the real threat of global cyberwar, and how vulnerable are IT infrastructures? Continue Reading