Security policy and user awareness
- 
				Opinion
					31 Oct 2025
					
									
										  Why asset visibility matters in industrial cybersecurityIndustrial organisations face rising operational security cyber threats. Asset visibility is vital for defence — without knowing what’s connected, organisations are risk blind Continue Reading 
- 
				News
					30 Oct 2025
					
									
										  Yubico bolsters APAC presence, touts device subscriptionsYubico is hiring local teams in Singapore and pitching its subscription service to help enterprises secure employee access to corporate networks and applications Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                08 Oct 2014
                  Malware being used to steal cash from ATMsCriminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                E-Zine
                06 Oct 2014
                  The future of digital government in the UKIn this week’s Computer Weekly, as the last political party conferences before the election come to an end, we examine the future of digital government in the UK, featuring interviews with Whitehall’s digital chief Mike Bracken and Labour’s policy leader Chi Onwurah. Also, we look at the growth of the open-source cloud computing platform Openstack, and find out what it’s like to be on the receiving end of a data breach. Read the issue now. Continue Reading 
- 
                E-Zine
                03 Oct 2014
                  CW Europe - October 2014 EditionBYOD policies: What’s allowed and what’s banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control. Continue Reading 
- 
                E-Zine
                29 Sep 2014
                  Hacking IT from the insideIn this week’s Computer Weekly, car giant Daimler talks about its IT security strategy and the benefits of having its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the latest best practice. Our new buyer’s guide looks at virtualisation backup. And our review of Microsoft’s Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now. Continue Reading 
- 
                News
                26 Aug 2014
                  Local authorities can improve data protection, says ICO auditThere is room for improvement in how local authorities protect personal data, says an audit report by the ICO Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                21 Aug 2014
                  Load balancing supports Kent County Council's VDI projectKent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                14 Jul 2014
                  Info sharing key to cyber defence, says financial services firmThreat information sharing is key to success in combating cyber attacks, says the Depository Trust and Clearing Corporation Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                04 Jul 2014
                  Barclays passes government’s ‘internet-born threat’ testBarclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading 
- 
                E-Zine
                22 Apr 2014
                  Adapting to life after HeartbleedIn this week’s Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks? Continue Reading 
- 
                News
                04 Apr 2014
                  Cabinet Office vetoed Home Office plans for 'critical' e-Borders replacementHome Office plans for IT systems to replace ageing border security systems that contain “critical vulnerabilities” were vetoed by the Cabinet Office Continue Reading By- Bryan Glick, Editor in chief
 
- 
                Feature
                14 Mar 2014
                  Hacktivism: good or evil?IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading By- Dai Davis, Percy Crow Davis & Co
 
- 
                News
                04 Mar 2014
                  IT Security Salary Index (UK)Are you being paid the right rate for the job? Check out this IT Security salary index from Acumin. Continue Reading - 
                News
                26 Feb 2014
                  Indian CISOs to develop more business skills to succeedOrganizations require Chief Information Security Officers (CISOs) to be much more than just a technical expert but also possess business skills in today’s growing technology driven Indian market Continue Reading By- Shaleen Sinha
 
- 
                News
                19 Feb 2014
                  UK firms see 1,000+ internal data breaches a day, study findsInternal threats are not a high priority for UK firms despite more than 1,000 internal data breaches a day Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                05 Feb 2014
                  Bank of England publishes Waking Shark II cyber security exercise resultsBank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading By- Caroline Baldwin, Freelance editor and journalist
 
- 
                News
                17 Jan 2014
                  Internet at risk of 'cybergeddon' says WEFInternet is at risk of fragmenting amid concerns over spying and cyber crime, says World Economic Forum Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                14 Jan 2014
                  Top European IT initiative to support business in 2014?Expanding IT to support business growth is one of the biggest areas of focus for IT departments in 2014, so what does this mean? Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                10 Jan 2014
                  Security considerations for UK enterprisesThis Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading - 
                News
                07 Jan 2014
                  Security Think Tank: Information security strategy should support the businessHow should Edward Snowden's revelations about the NSA and GCHQ influence future information security strategies in the UK? Continue Reading By- Adrian Davis, (ISC)²
 
- 
                News
                30 Dec 2013
                  Bank robberies down 90% thanks to technology, says reportRobberies at British banks have fallen by over 90% in two decades, according to a report by the British Bankers’ Association Continue Reading By- Caroline Baldwin, Freelance editor and journalist
 
- 
                E-Zine
                16 Dec 2013
                  Can BlackBerry restore its business appeal?In this week’s issue of Computer Weekly, we examine whether former Sybase chief, John Chen, will be able to stem the decline of BlackBerry and reinvent the the smartphone maker as a software business for the “bring your own device” (BYOD) era. Our buyer’s guide to the internet of things concludes with a look at how universal connectivity will yield insights in fields as diverse as aviation and hospitality. And we analyse Google’s attempts to compete with Amazon Web Services in public cloud. Continue Reading 
- 
                News
                04 Dec 2013
                  Proof-of-concept malware jumps air gap with sound cardResearchers demonstrate proof-of-concept malware exfiltrating data using high-frequency transmissions inaudible to humans Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                04 Dec 2013
                  The Guardian denies Snowden stories damaged national securityGuardian editor Alan Rusbridger defends decision to publish stories on documents leaked by whistleblower Edward Snowden Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                04 Dec 2013
                  UK proposes formal talks on cyber security with ChinaPrime minister David Cameron has called on China to be more open about cyber security Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                28 Nov 2013
                  EU calls on US to rebuild trust in post-Snowden eraThe EC has called on the US to provide guarantees to restore trust in the wake of spying revelations Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                27 Nov 2013
                  European Parliament closes Wi-Fi after man-in-the-middle attackA number of mailboxes have been compromised and users’ smartphones could be at risk following a man-in-the-middle attack on the European Parliament’s public Wi-Fi Continue Reading By- Jennifer Scott, TechTarget
 
- 
                News
                26 Nov 2013
                  FTSE 350 firms complete cyber risk assessmentMost FTSE 350 companies put cyber risk on the board agenda, but many need to improve how they manage that risk Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                25 Nov 2013
                  Facebook authentication - Like?As Cisco teams up with Facebook to offer authentication for public Wi-Fi, is this option safe for businesses? Continue Reading By
- 
                News
                12 Nov 2013
                  Mass surveillance a bad idea, says Information Commissioner Christopher GrahamInformation Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                12 Nov 2013
                  Global profiles of the fraudsterComputers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading - 
                News
                29 Oct 2013
                  Analysis: RSA says security needs to change, but what does that mean?RSA executive chairman Art Coviello has issued a call to action to the security industry to improve technology and collaboration Continue Reading 
- 
                News
                15 Oct 2013
                  The ICO issues BYOD warning after breachThe ICO is calling on organisations to ensure data protection policies reflect how employees are using personal devices for work Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                Photo Story
                15 Oct 2013
                  10 security reasons to upgrade to iOS 7Even if it did not include numerous security fixes, iOS 7 has compelling reasons for corporates to adopt it to improve their security Continue Reading By- Rob Buckley
 
- 
                News
                14 Oct 2013
                  Is India’s cyber policy all words and no action?The Indian government is trying to strengthen cyber security with the new cyber policy, but little is yet understood about how the ambitious proposals will be put in place Continue Reading By- Viraj V Desai
 
- 
                Opinion
                03 Oct 2013
                  Privacy concerns in the digital worldConsidering the full spectrum of privacy, people need to ask themselves if they are comfortable with all their characteristics in the public domain Continue Reading By- Yves Le Roux, (ISC)2
 
- 
                News
                19 Sep 2013
                  NSA reveals how Snowden accessed secret Prism filesPrism whistleblower Edward Snowden accessed secret documents through a file-share, the NSA has revealed Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                06 Sep 2013
                  NSA and GCHQ unlock online privacy encryptionUK and US intelligence agencies have unlocked the technology used to encrypt online services, including email, online banking and medical records. Continue Reading By- Caroline Baldwin, Freelance editor and journalist
 
- 
                News
                05 Sep 2013
                  Windows 2012 Server Network SecurityThis book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading - 
                News
                05 Sep 2013
                  Windows Server 2012 Security from End to Edge and BeyondThis extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading - 
                News
                05 Sep 2013
                  Printing: a false sense of security?Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading - 
                Photo Story
                29 Aug 2013
                  Rapid7 United 2013 Security SummitView the pics from Rapid7’s recent security summit in Boston. Continue Reading By- Kayleigh Bateman, Computer Weekly
 
- 
                News
                21 Aug 2013
                  Case study: Keeping it private at Beth Israel Deaconess after the Boston Marathon AttacksDoctor and healthcare CIO shares his lessons learned from the Boston Marathon attacks and how to protect patient data Continue Reading By- Kayleigh Bateman, Computer Weekly
 
- 
                News
                20 Aug 2013
                  Targeted attacks and how to defend against themAnalysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading - 
                Feature
                19 Aug 2013
                  Top 10 Android security tipsAs Android becomes more prevalent in the enterprise, Computer Weekly gives you 10 top tips for keeping your devices secure Continue Reading By- Paul Marchant
 
- 
                News
                05 Aug 2013
                  Websites hacked to show child abuse imagesMore than 25 business websites worldwide have been hacked to show illegal images of child sex abuse Continue Reading By- Caroline Baldwin, Freelance editor and journalist
 
- 
                Feature
                30 Jul 2013
                  Big data journalism exposes offshore tax dodgersHow journalists harnessed big data to challenge offshore financial secrecy Continue Reading By- Duncan Campbell and Craig Shaw
 
- 
                News
                26 Jul 2013
                  FireEye partners with Phishme for multi-layered securitySecurity technology developer FireEye has partnered with phishing awareness training firm PhishMe to offer a multi-layered approach to securing information networks Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                22 Jul 2013
                  Insider threat: Balancing security with privacyHow can organisations increase security without affecting productivity or encroaching on employees’ right to privacy? Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                19 Jul 2013
                  IT security case studiesFour critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading - 
                News
                18 Jul 2013
                  Needle in a Datastack: The rise of big security dataThis research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading - 
                News
                17 Jul 2013
                  2013 Cost of Data Breach Study: UKThe cost of data breaches has risen for UK organisations over the past year, the Ponemon Institute reveals. Continue Reading - 
                News
                17 Jul 2013
                  Security Think Tank Download: Bring your own deviceDownloadable guide. How to make your company secure when you introduce BYOD. Continue Reading - 
                News
                17 Jul 2013
                  IT Security Case StudiesWarwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading - 
                News
                04 Jul 2013
                  FBI warns of increased spear phishing attacksThe FBI has issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                21 Jun 2013
                  Most firms underestimate volume of malware, study showsMost companies greatly underestimate the number of malicious programs appearing daily, a global survey of more than 2,000 IT professionals has revealed Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                21 Jun 2013
                  Government launches cyber awareness campaignUK government debuts the first stage of a £4m cyber awareness campaign as part of the National Cyber Security Programme Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                10 Jun 2013
                  2013 Cost of Data Breach Study: UKThe cost of data breaches has risen for UK organisations over the past year, but companies that appoint chief information security officers with enterprise-wide responsibilities can reduce their costs, this report from the Ponemon Institute reveals Continue Reading - 
                News
                05 Jun 2013
                  Human error causes most data breaches, Ponemon study findsHuman errors and system problems caused two-thirds of data breaches in 2012, according to a study from Symantec and the Ponemon Institute Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                21 May 2013
                  Privileged accounts key to most APT attacks, says Cyber-ArkThe theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                13 May 2013
                  Cyber criminals hack Washington court systemHackers gain access to the personal data of 160,000 US citizens after compromising Washington State court service servers Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                03 May 2013
                  Computer Weekly European User Awards for Security: WinnersThe winners are in for the Computer Weekly European User Awards for Security. See who made the top spots. Continue Reading By- Kayleigh Bateman, Computer Weekly
 
- 
                News
                01 May 2013
                  CW buyer's guide: context-aware securityThis 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading - 
                News
                01 May 2013
                  CW Special Report on CSCThis 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading - 
                News
                29 Apr 2013
                  Another online firm hit by data breachOnline deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details Continue Reading 
- 
                News
                24 Apr 2013
                  Protecting against modern password crackingThis article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. Continue Reading - 
                Feature
                16 Apr 2013
                  How to create a good information security policyInformation security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading By- Andi Scott
 
- 
                News
                11 Apr 2013
                  Bots and web apps among top threats to data security, says Check PointBots, viruses, breaches and attacks are a constant and real threat to the information security of organisations Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                11 Apr 2013
                  Porn websites pose malware risk, says researcherBrowsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                04 Apr 2013
                  Effective print security for SMBsAnalysts Louella Fernandes and Clive Longbottom discuss how integrated print management provides SMBs with a simple and scalable approach for print security. Continue Reading - 
                News
                03 Apr 2013
                  US Army practises poor data security on mobile devicesPentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                26 Mar 2013
                  Employees ignore security rules, say infosec prosMost information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                11 Mar 2013
                  Phishing emails sent in pairs to lend authenticity, says training companyPhishing emails are now being deployed in pairs to create the illusion of authenticity, says security awareness training company PhishMe Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                E-Zine
                05 Mar 2013
                  The security risk sweeping EuropeNever have we been so open about the information we share online, without so little concern for our privacy. Social media can be a threat to a company, not just to what information an employee chooses to disclose, but because social media sites are prime targets for cybercrime. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses. Continue Reading 
- 
                News
                05 Mar 2013
                  Security the future: Keeping up with the businessGareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. Continue Reading - 
                News
                27 Feb 2013
                  350,000 different types of spam SMS messages were targeted at mobile users in 2012350,000 different variants of unsolicited spam SMS messages were accounted for in 2012, with 53,000 variants logged for December alone Continue Reading By- Caroline Baldwin, Freelance editor and journalist
 
- 
                News
                27 Feb 2013
                  Health records should be protected like bank details, says BCSThe BCS and NHS say people should protect their online medical records in the same way they look after their bank details Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                18 Feb 2013
                  The Demise in Effectiveness of Signature and Heuristic Based AntivirusAnti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. Continue Reading - 
                News
                15 Feb 2013
                  Bad outsourcing decisions cause 63% of data breachesBad outsourcing decisions nearly two-thirds of data breaches investigated by security firm Trustwave in the past year Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                Feature
                11 Feb 2013
                  How to find the most vulnerable systems on your internal networkMost corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading By- Peter Wood, First Base Technologies LLP
 
- 
                Feature
                07 Feb 2013
                  Social media: A security challenge and opportunityGeneration Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                25 Jan 2013
                  Encryption is safe bet, says SafeNetEncryption is the only thing that can give peace of mind to CIOs and CISOs, says Dave Hansen, president and CEO of security firm SafeNet Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                18 Jan 2013
                  Security visualisationThis article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities Continue Reading - 
                News
                09 Jan 2013
                  UK Border Agency tenders for security systemsThe UK Border Agency (UKBA) and Border Force is tendering for an integrated border security system Continue Reading By- Kathleen Hall, TechTarget
 
- 
                Photo Story
                07 Dec 2012
                  Highlights from PwC’s State of Information Security Survey, India 2013We bring you excerpts from PwC’s India survey on the state of information security as part of this photofeature. Continue Reading By- SearchSecurity.in staff
 
- 
                News
                06 Dec 2012
                  2012 Cost of Cyber Crime Study: UKThe 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. Continue Reading - 
                News
                03 Dec 2012
                  IT Security Purchasing Intentions 2013This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Continue Reading - 
                News
                19 Nov 2012
                  Cyber criminals target Skype, Facebook and Windows usersCyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI Software Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                16 Nov 2012
                  Nasa to encrypt data after latest breachNasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                News
                13 Nov 2012
                  The Global State of Information Security Survey 2013: Key FindingsThis global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. Continue Reading - 
                News
                31 Oct 2012
                  ‘VM-aware’ viruses on the riseViruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky Continue Reading By- Jennifer Scott, TechTarget
 
- 
                News
                25 Oct 2012
                  ICO hits Stoke-on-Trent City Council with £120,000 fineStoke City Council has breached the Data Protection Act, for the second time in two years, after details of a child protection legal case were emailed to the wrong person. Continue Reading By- Jennifer Scott, TechTarget
 
- 
                Feature
                10 Oct 2012
                  CW500: Managing the mobile workforce (part 1)Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                17 Sep 2012
                  Android devices vulnerable to security breachesMore than 50% of devices running Google's Android OS have unpatched vulnerabilities, opening them up to malicious apps and other attacks Continue Reading By- Caroline Baldwin, Freelance editor and journalist
 
- 
                News
                17 Sep 2012
                  IT security awareness needs to be company-wide, says (ISC)²Information security awareness needs to be more robust, started as early as possible, continually reinforced and organisation-wide, says Julie Peeler, director, (ISC)² Foundation Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                Tutorial
                04 Jan 2012
                  IT in Europe, Security Edition: Password security standards and trendsPasswords have long been a security problem. This IT in Europe: Security Edition looks at password trends and alternative forms of authentication. Continue Reading By- SearchSecurity.co.UK Staff
 
- 
                News
                21 Dec 2011
                  ICO stands by unpopular UK cookie legislation with advice, warningsWebsite owners have resisted compliance with cookie legislation so the ICO has issued more guidance and warnings to nudge them along. Continue Reading By
- 
                Tip
                19 Dec 2011
                  Segregation of duties: Small business best practicesSegregating duties can be tough in organisations that have few staff members and resources. Get duty segregation best practices for SMBs. Continue Reading By
- 
                News
                05 Dec 2011
                  Concerned about tablet security issues? Some are, others not so muchUsers love their tablets, but security pros are concerned about tablet security issues. However, though tablets bring new threats, not everyone is ringing the alarm. Continue Reading By
- 
                Tip
                25 Aug 2011
                  Map your data classification policy to controls effectively: How-toData classification policy plays an important role in control implementation and effectiveness. We take a look at the involved parameters. Continue Reading By- Vishal Gupta
 
- 
                News
                23 Aug 2011
                  Scholarships aim to encourage women to pursue cybersecurity careersTo boost the percentage of women in IT security careers, (ISC)2 has instituted two new scholarships, each totalling up to $40,000 per year. Continue Reading By

 
		