Opinion
Opinion
IT for telecoms and internet organisations
-
Security Think Tank: Are companies too confident about targeted attacks?
What can enterprise learn from initial analysis of Flame? Continue Reading
-
Security Think Tank: Flame a good reason to keep up with emerging threat analysis
What can the enterprise learn from the initial analyses of the Flame malware? Continue Reading
-
Security Think Tank: Flame is an opportunity for businesses to reassess defences
What can enterprise learn from initial analysis of Flame? Continue Reading
-
Security Think Tank: Flame – business must prepare for the unpredictable
What can enterprise learn from initial analysis of Flame? Continue Reading
-
Enterprise log managers: An unsexy but vital tool
In today’s enterprise, you would be culling through millions of events if you were not relying on enterprise log managers to correlate that data Continue Reading
-
Security Think Tank: The only sustainable approach to security is intelligence-led
What should organisations be doing to benefit from the move to intelligence-led security? Continue Reading
-
Security Think Tank: Intelligence-led security demands planning ALREADY USED
What should organisations be doing to benefit from the move to intelligence-led security? Continue Reading
-
Why the Data Communications Bill is proportionate, measured and necessary
Data-sharing Czar Sir Bonar Neville-Kingdom defends Her Majesty's Government's internet monitoring plans in the face of "self-righteous conspiracy theorists". Continue Reading
-
Security Think Tank: Intelligence-led security could give IT pros the edge
What should organisations be doing to benefit from intelligence-led security? Continue Reading
-
Security Think Tank: Proof of intelligence-led security is in the metrics
What should organisations do to fully exploit intelligence-led security? Continue Reading
-
Security Think Tank: Using big data for intelligence-led security
How can organisations use big data to yield hidden information of benefit to intelligence-led security? Continue Reading
-
Security Zone: IT and protective services convergence
IT professionals can gain a practical understanding of how to prevent criminal attacks from the people-savvy protective services Continue Reading
-
Security Think Tank: Intelligence-led security is about risk management
What should organisations be doing to benefit from move to intelligence-led security? Continue Reading
-
Security Think Tank: Intelligence-led security is more efficient and effective
What should organisations be doing to benefit from move to intelligence-led security? Continue Reading
-
Security Think Tank: Security intelligence needs a plan
What should organisations be doing to benefit from the move towards intelligence-led security? Continue Reading
-
Security Zone: Patch me please
The technical reasons for failing to patch are fading into the past Continue Reading
-
Cookie consent: Preparing for the compliance crunch
Data privacy specialist Phil Lee from law firm Field Fisher Waterhouse answers some commonly asked questions about the new cookie rules Continue Reading
-
Cloud choices: How to select the right hosted services
Adopting cloud computing can save money, but it is important to choose the right cloud solution for your business needs Continue Reading
-
Security Think Tank: Outsource only run-of-the-mill security functions
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: Effective management essential for IT security outsourcing
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: Three considerations to outsourcing IT security
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: IT security outsourcing should be informed and risk-managed
Security experts advice on what should and should not be outsourced in IT security Continue Reading
-
Security Think Tank: Effective quality control key to security outsourcing
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: Business cannot outsource accountability
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: No one-size-fits-all approach to security outsourcing
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: Start with capability gap when outsourcing security
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: Outsourcing of IT security is not for everyone
What should and what should not be outsourced in IT security? Continue Reading
-
Security Zone: Business continuity: putting the plan to work
A strong business continuity model – with performance criteria and supporting management systems – is required to assure a workable roadmap to recovery Continue Reading
-
Security Think Tank: How can business achieve compliance and security? (Part 8)
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
What businesses need to do before the cookie law deadline
Organisations have to get their house in order ahead of the 26 May 2012 deadline for European e-commerce regulations governing the use of cookies. Continue Reading
-
Security Think Tank: How businesses can achieve compliance and security (Part 6)
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
Security Think Tank: How businesses can achieve compliance and security (part 5)
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
Security Think Tank: How businesses can achieve compliance and security
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
Security Think Tank: How businesses can achieve compliance and security (Part 2)
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
Security Think Tank: How can business achieve compliance and security? (Part 1)
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
Security Zone: LinkedIn or left out?
LinkedIn is a great tool to market yourself and it claims 150 million members in 200 countries and territories; but who vouches for the integrity of LinkedIn? Continue Reading
-
How to prepare for proposed EU data protection regulation
The proposed EU data protection framework is under scrutiny and debate, but there are practical steps that companies could usefully be considering now. Continue Reading
-
Security Think Tank: How to prepare for EU data protection rules (part 7)
The changes to the EU data protection laws are intended to simplify what has become a quagmire of differing standards derived from existing legislation Continue Reading
-
Security Think Tank: How to prepare for EU data protection rules (part 6)
With the new EU Directives for Data Protection knocking on the door of organisations, it is time to wake up and prepare for the data privacy law changes Continue Reading
-
Security Think Tank: How should UK business prepare for EU data protection rules? (part 4)
There are eight main areas of the proposed EU data protection framework organisations should note, according to global IT security association ISACA Continue Reading
-
Security Think Tank: How to prepare for EU data protection rules (part 3)
If your CIO has little board input or budget responsibilities, now is the time to make these changes – to empower the CIO with budget responsibility and board influence Continue Reading
-
Security Think Tank: How to prepare for EU data protection rules (part 2)
Proposed changes to the existing EU Data Protection Directive aim to unify the existing legislation of each EU Member State, theoretically making it easier for businesses to transfer data throughout the EU and beyond Continue Reading
-
Security Zone: Adopting cloud services with confidence
Cloud-based services are highly attractive to many organisations. But what are the emerging issues you need to know about? Continue Reading
-
Mobile devices: balancing security and morale
In today's ever-evolving world of new gadgets, devices and connected technologies, it is becoming increasingly difficult to keep a cap on the new risks that arise on a daily basis, writes Clint Merritt, CISSP, senior information security analyst for... Continue Reading
-
Social media and IT support - which side is your bread buttered?
While IT underpins the social media revolution, IT managers are only scratching the surface when it comes to using these tools to improve IT service and support. Continue Reading
-
Security Think Tank: Challenges and opportunities of smartphone security policy (part 8)
The use of smartphones in the workplace brings many benefits to organisations, but also risks. Increasingly, users want to experience the functionality available to them in their private lives in their professional lives, and certainly businesses ... Continue Reading
-
Security Think Tank: What are the challenges/opportunities of smartphone security policy? (part 7)
Smartphones have become wide spread in both the consumer and business realms. More importantly, employees expect they can hold just one device for their everyday use thus the boundary between personal and business usage is diminishing. The companies... Continue Reading
-
Reach out to children to secure tomorrow's workplace
Organisations should be working with current knowledge of how behaviour is changing in the workplace Continue Reading
-
Security Think Tank: Challenges and opportunities of smartphone security policy (part 5)
There are security challenges throughout the whole smartphone lifecycle, from device creation and marketing, through purchase, implementation and operation, to the eventual recycling or destruction of the device. Continue Reading
-
Security Think Tank: Challenges and opportunities of smartphone security policy (part 4)
In many ways, smartphones can be more secure operating platforms than PCs, but there is one major policy issue that needs to be dealt with first, writes John Pescatore, vice-president and distinguished analyst at Gartner. Continue Reading
-
Security Think Tank: Challenges and opportunities of smartphone security policy (part 3)
The smartphone – and tablet – revolution offers organisations new ways of performing their work and realising tangible benefits. They offer new paths to gain business and competitive advantage by creating new customer services and experiences, and ... Continue Reading
-
Security Think Tank: What are the challenges/opportunities of smartphone security policy? (part 2)
The main challenge of the smartphone is keeping it and its contents safe, writes Peter Wenham, committee member of the BCS Security Forum strategic panel and director of information assurance consultancy Trusted Management. Continue Reading
-
Security Think Tank: Challenges and opportunities of smartphone security policy
Employees using their personal smartphones for work present added pressures to keep the network secure. Continue Reading
-
Security Zone: Security and collaboration – we're In this together
2011 saw a shift in targets and attack vectors. Smaller targets with fewer defences, and more external sources earmark the reported breaches last year Continue Reading
-
Opinion: Cloud, mobility, social among top infosec challeges for 2012, says ISACA
What is the most important nut for infosec to crack in the coming year and why? Global IT security association ISACA gives its views. Continue Reading
-
Mobile security among top priorities for 2012
Solving security issues relating to the use of mobile technologies will be among the most pressing priorities for businesses in 2012. Continue Reading
-
Security skills gap to become crucial in 2012, says (ISC)2
The emerging threat in the developing cybersecurity skills gap is an issue (ISC)2 has highlighted throughout 2011, and 2012 will be the year when industry really begins to feel it, particularly in London with the Olympic Games coming to town. Continue Reading
-
Opinion: Supply chain security should be top goal in 2012, says ISF
The most important thing to achieve in information security in 2012 is supply chain security, writes Adrian Davis, principal research analyst at in Information Security Forum (ISF). Continue Reading
-
International collaboration key for infosecurity in 2012
Outgoing year 2011 has been turbulent and eventful for information security, with a number of high-profile security incidents and an increase in cybercrime, and there is no indication that 2012 is going to be any different. Continue Reading
-
Need ideas for improvement? Ask your customers
Continual service improvement is a key tenet of IT service management and a fundamental part of the ITIL service lifecycle. Continue Reading
-
The real risk of cyber attack on unsecured networks
New revelations of the cyber threat to government and business identify the risk of attack even when stopping for a cup of coffee. Continue Reading