Opinion
Opinion
IT for telecoms and internet organisations
-
Understand your security risks
Information is at risk – and organisations have to adequately protect their corporate information, especially the “crown jewels” Continue Reading
-
How to assess the security of a cloud service provider
As businesses continue to put more information online, understanding cloud suppliers and agreements has never been more important Continue Reading
-
Security Think Tank: Prism fallout could be worse than security risks
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists? Continue Reading
-
Security Think Tank: Prism is dangerous for everyone
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists? Continue Reading
-
BBC's DMI project failure is a warning to all organisations
The decision to cancel the BBC’s Digital Media Initiative (DMI) with nothing to show for the almost £100m spent on it should be a warning to other organisations about the risks involved in large-scale IT projects Continue Reading
-
Security Think Tank: Make security and compliance part of workflow to achieve balance
What is the best way to balance business need for network and application access with security and regulatory requirements? Continue Reading
-
Cloud security for SMEs: Seven key steps
Seven steps which SMEs should follow when considering a cloud service, selecting a cloud provider and managing a cloud contract Continue Reading
-
Security Think Tank: Checklists are dead, long live risk-driven security
What is the best way to balance business need for network and application access with security and regulatory requirements? Continue Reading
-
How to build a website security programme
Follow this step-by-step strategy for building a website security programme that yields results Continue Reading
-
Security Think Tank: Avoid disruption and build on the context
What is the best way to balance business need for network and application access with security and regulatory requirements? Continue Reading
-
Security Think Tank: Understanding risk key to security balance
What is the best way to balance business need for network and application access with security and regulatory requirements? Continue Reading
-
Security Think Tank: Four ways to balance access and security
What is the best way to balance business need for network and application access with security and regulatory requirements? Continue Reading
-
Information security: From “bored” to “board”
As the threat landscape is changing, the real question lies in what information security professionals can do to get board-level backing Continue Reading
-
How to manage big data and reap the benefits
IT security group Isaca examines the benefits of managing big data and offers seven tips for staying in control Continue Reading
-
Security Think Tank: Cloud, BYOD and security – lock your doors
With BYOD and the growth of the personal cloud being used at work, what security measures can IT take to ensure security of enterprise data and does MDM really have a role in security? Continue Reading
-
Security Think Tank: Management is key to secure BYOD
With BYOD and the growth of the personal cloud being used at work, what security measures can IT take to ensure security of enterprise data and does MDM really have a role in security? Continue Reading
-
Security Think Tank: MDM just one way to lower the risk of BYOD
With BYOD and the growth of the personal cloud being used at work, what security measures can IT take to ensure security of enterprise data and does MDM really have a role in security? Continue Reading
-
Security Think Tank: BYOD – a challenge and an opportunity
With the growth of BYOD, what security measures can IT take to ensure security of enterprise data – and does MDM have a role? Continue Reading
-
Security Think Tank: BYOD means the map is no longer the territory
With the growth of BYOD and personal cloud at work, how can IT ensure the security of corporate data and does MDM have a role? Continue Reading
-
Security Think Tank: BYOD – key tenets and best practices
With BYOD and the growth of the personal cloud being used at work, what security measures can IT take to ensure security of enterprise data and does MDM really have a role in security? Continue Reading
-
Will proposed changes to European data protection law prove unworkable?
Data protection law in Europe is set to change, but it remains unclear if all proposals are workable Continue Reading
-
What IT managers need to know about risky file-sharing
Business professionals must share files regularly to be collaborative, but there are issues that IT managers should be aware of. Continue Reading
-
Security Think Tank: MDM is no BYOD silver bullet
With BYOD and personal cloud at work, what measures can IT take to ensure security of enterprise data and does MDM really have a role? Continue Reading
-
Security Think Tank: BYOD security: policy, control, containment, and management
With the growth of BYOD, what security measures can IT take to ensure security of enterprise data – and does MDM have a role? Continue Reading
-
Security Think Tank: Embrace BYOD, but be wary of the risks
With BYOD and the growth of the personal cloud being used at work, what security measures can IT take to ensure security of enterprise data and does MDM really have a role in security? Continue Reading
-
First BYOD, now BYON poses security challenge
Like BYOD before it, the march of BYON is happening silently, stealthily and almost completely outside of management control Continue Reading
-
Why the cloud is not a security nightmare
A well-governed cloud initiative can deliver significant value to an enterprise, writes News International CISO Amar Singh Continue Reading
-
How to negotiate and assure cloud services
This guide provides the top tips to negotiating and assuring cloud services Continue Reading
-
Going digital: No simple solutions for information security professionals
Technology evolution is proving itself to be something of a double-edged sword Continue Reading
-
Stop service providers becoming data security Achilles heel
Minimising cyber security risks through third-party suppliers is a challenge facing many organisations. Continue Reading
-
Security Think Tank: Context-aware security saves time
How should businesses approach context-aware security technologies and what will be the business benefit? Continue Reading
-
How to ensure information security is at the heart of the business
If infosec professionals want to be accepted as crucial around the decision-making table, they must embrace change and review their approach Continue Reading
-
Embrace BYOD and manage the risks
BYOD might sound like an invitation (bring), but it is actually more of a rebellion (I’m bringing). Firms must get ready Continue Reading
-
Security Think Tank: High levels of control require detailed security intelligence
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Security Think Tank: Context-aware tech does not eliminate human touch
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Security Think Tank: Context, the 5 Ws and H of security
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Selling online? A guide to complying with the PCI
PCI-DSS compliance can leave retailers confused about how best to approach this daunting task. What is it they actually need to do? Continue Reading
-
Security Think Tank: context-aware security is business-aware security
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Cyber security – the best weapon remains good information security hygiene
By understanding the threats they face, organisations can mobilise IT systems and staff to defeat all but the most expert and determined adversary Continue Reading
-
Security Think Tank: New tech trends fuel need for context-based security
How should firms approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Security Think Tank: Begin switch to context-aware security now, says Gartner
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Security Think Tank: Context-aware security is about more than buying technology
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Security Think Tank: Three key security questions on web-based apps
What are the security pitfalls of web-based applications and how are they best avoided? Continue Reading
-
Security Think Tank: Web-based app security needs data-centric, risk-based approach
What are the security pitfalls of web-based applications and how are they best avoided? Continue Reading
-
Security Zone: A three-dimensional approach to BYOD (part 2)
Employees are the first line of defence and crucial to BYOD success, but process and technology are equally important Continue Reading
-
Tips for reducing security risks in 2013
What security threats will your business face in 2013? Continue Reading
-
Security Zone: A three-dimensional approach to BYOD
Minimise the security threat of BYOD by taking a three-dimensional approach involving people, process and technology Continue Reading
-
How to build a business continuity and recovery plan
Practical tips on how to build a comprehensive business continuity and recovery plan for your business Continue Reading
-
Tips for better governance and compliance
What is the relationship between regulation, governance and IT, and how can they contribute in ways that support the business? Continue Reading
-
Security Think Tank: Infosec and the business – the symbiotic relationship
How can information security make business sense? Continue Reading
-
Security Think Tank: Basic engagement principles can boost IT security’s profile
How can information security make business sense? Continue Reading
-
Security Think Tank: Evaluate IT security investments
How can information security make business sense? Continue Reading
-
Security Think Tank: Four steps to show value of IT security
How can information security make business sense? Continue Reading
-
Security Think Tank: Infosec professionals need to communicate value to business
How can information security make business sense? Continue Reading
-
Security Think Tank: A risk-based approach to security is key to business alignment
How can information security make business sense? Continue Reading
-
Security Think Tank: Information security is not optional
How can information security make business sense? Continue Reading
-
Security Think Tank: People and risk key to aligning security and business
How can information security make business sense? Continue Reading
-
Five steps to climbing the IT security ladder
Five steps to help stay ahead of the pack in IT security Continue Reading
-
Don’t get spiked by a spear phisher
How to avoid the latest hacking techniques: the telltale signs that a spear phishing attack is in action; how to deflect it; and how to contain damage Continue Reading
-
Security Think Tank: Ask the right data security questions in M&As
What role do IT security professionals play in mergers and acquisitions? Continue Reading
-
Security Think Tank: In M&As, watch the exits
What is the role of IT security professionals in mergers and acquisitions? Continue Reading
-
Security Think Tank: Added burden for information systems professionals in M&As
What role do IT security professionals play in mergers and acquisitions? Continue Reading
-
European Commission should keep its hands out of the cloud
Would you be surprised that the European Commission believes the way to promote the growth of cloud computing is to regulate it? Continue Reading
-
Security Think Tank: Infosec needs to be part of all M&A processes
What is the role of IT security professionals in mergers and acquisitions? Continue Reading
-
Security Think Tank: Use M&As to reinvigorate security policy
What role do IT security professionals play in mergers and acquisitions? Continue Reading
-
Security Think Tank: Security often overlooked in M&As
What role do IT security professionals play in mergers and acquisitions? Continue Reading
-
Security Zone: Do you need a CISO?
Does an organisation really need a chief information security officer or chief information officer? Continue Reading
-
Security Think Tank: Make IP theft personal
IP theft: who should be tackling it and how? Continue Reading
-
Security Think Tank: Blocking IP theft takes technology and trust
IP theft: who should be tackling it and how? Continue Reading
-
Security Think Tank: SABSA will go a long way in preventing IP theft
IP theft: who should be tackling it and how? Continue Reading
-
Security Think Tank: IP theft: Have you got all the bases covered?
IP theft: who should be tackling it and how? Continue Reading
-
Security Think Tank: You can’t protect what you don’t know you’ve got
IP theft: who should be tackling it and how? Continue Reading
-
Security Think Tank: Least privilege is key to blocking IP theft
Intellectual property (IP) theft: Who should be tackling it and how? Continue Reading
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how? Continue Reading
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees cope Continue Reading
-
How history of security shows we have not learnt our lesson
There is no security control more effective than a diligent system administrator Continue Reading
-
How IT security can drive business and enable innovation
The most critical IT security challenge is to be able to see the whole picture, understand the business needs and find solutions Continue Reading
-
How to ensure you are getting the right cloud service
How can an organisation use an indirect governance to assure trust in cloud services? Continue Reading
-
Security Think Tank: Several factors feed SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
Security Zone: Scada exploit fans the Flame of data risk
Analysis of the sophisticated and evidently well-resourced code behind the Flame malware exploit raises the stakes of data security exponentially Continue Reading
-
Security Think Tank: Best practice to target SQLi
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
How to secure a SharePoint environment
Five lines of defence you need to secure your Microsoft SharePoint environment Continue Reading
-
Security Think Tank: No quick fix to SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
Security Think Tank: SQLi attacks fly under security testing radar
Why is SQL injection still a successful way of attacking web applications and what should you do to eliminate this common vulnerability? Continue Reading
-
Security Think Tank: Quick time to market to blame for many SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
Security Think Tank: Development and testing key to reducing SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
How to survive a data breach
Six practical tips on how to prepare for and survive a data breach Continue Reading
-
BYOD V.2 and spotting the next big trend
An analytical look into how the BYOD trend began may help IT leaders to be more prepared to spot the next big trend Continue Reading
-
Security Think Tank: Six questions to ask about security and virtualisation
How should information security professionals get started with securing virtual environments? Continue Reading
-
440 million reasons to learn three IT risk lessons
Companies can change their game to better prevent incidents, enable faster value creation, and avoid wasted time and money when managing risk Continue Reading
-
Security Think Tank: Virtualisation raises three main security issues
How should information security professionals get started with securing virtual environments? Continue Reading
-
Security Think Tank: Configuration is key to virtual security
How should information security professionals get started with securing virtual environments? Continue Reading
-
Security Think Tank: Virtual security more than just technology
How should information security professionals get started with securing virtual environments? Continue Reading
-
Security Think Tank: Security in the virtual world still not 100%
How should information security professionals get started with securing virtual environments? Continue Reading
-
Security Think Tank: Security in virtual world requires special considerations
How should information security professionals get stated with securing virtual environments? Continue Reading
-
Security Think Tank: Hypervisor is key to securing virtual servers
How should information security professionals get started with securing virtual environments? Continue Reading
-
Forrester: How to build a security change plan
When the risk associated with a serious breach becomes overwhelming, organisations must invest to improve the skills, processes and controls Continue Reading
-
Security Think Tank: Flame shows why risk management is a business essential
What can enterprise learn from initial analysis of Flame malware? Continue Reading
-
Security Think Tank: Flame – proceed with caution
What can enterprise learn from initial analysis of Flame? Continue Reading
-
Security Think Tank: Security reviews are in order post Flame
What can enterprise learn from initial analysis of Flame? Continue Reading