More on the smartcard story - a solution
Smartcard sharing - a breach of IT security or a way around slow access to NHS Care Records?
South Warwickshire General Hospitals NHS Trust statement to Computer Weekly on smartcard sharing
Selling the NHS's National Programme for IT - a PR challenge
Moore's Law and Security
White Hats Do Good
Security and the Environment
Time to Publicise Security Incidents?
EDS’s settlement with the government over tax credits
Assessing data handling
Downside of vulnerabilty testing
What contribution to NHS IT do Local Service Providers make?
Tom Brooks - opinion piece - What contribution to NHS IT do Local Service Providers make?
Levels of detail
Risk perceptions and historical data
Is the NHS's National Programme for IT costing too much?
Employee Monitoring - a hot topic for 2007
More Testing Please
Compliance, change control, and firewalls
The Perils of Mis-addressed Communications
Better Authentication Needed to Counter Man-in-the-Middle Attacks
Web site password policy
Identity and Passport Service director: Why we?re going public on IT projects we didn?t get right
NHS's National Programme for IT - a consultant's one-sentence view
Going to America
Database Security - Patching is not enough
More incident response
Unit testing software
Influential health user who criticised NHS Programme for IT is to join BT, one of the suppliers
Lord Hunt - a good choice of minister in charge of the NHS's National Programme for IT?
Incident definition and response
Countering the Threat of Information Security Fatigue
Robin Guenier comments on British Computer Society's paper on way forward for NHS's IT programme
No matter how far you have gone down the wrong road, turn back
Risk assessment software deployment
It's the developers fault....is it?
Who Needs Firewalls?
Top campaigner for independent review of NHS's IT scheme receives New Year Honour
Another unstructured blog
A matter of life and death
ATM Security - and how not to improve it
Show me the evidence
Real Crime in the Virtual World
PCI makes for "Superior Security"
Rats in a sewer...
Around 1,000 staff leave CSC - a key supplier to the £12.4bn NHS scheme
Vista Content Protection – Can we have the facts please?
How important is this?
Security and Governance – One size doesn’t always fit all
Importance of security in the SDLC
Importance of documenting requirements
A Security Resolution for 2007 - Embed Security into your System Development Cycle
Security Forecasts for 2007
People, Process or Technology - Which hits the spot?
What motivates a web site attack
Security Achieves a New Level of Maturity
A pre-Christmas Saturday Soapbox
ID Cards and the Perils of Identity Management
Perceptions are the key to mitigating risk
It can happen anywhere
A Worrying Trend in Malware
VISA PCI Incentives
Confidential NHS paper on the health of the National Programme for IT
Truth, Lies and Perception
Why NHS IT matters
More on risk assessment
Real world risk assessment - don't forget to consider costs
The Strengths and Weaknesses of Data Mining
Safeguarding data - it's all in the process
HM Revenue and Customs, the Public Accounts Committee and accountability
Digital Rights Management – Must Try Harder
NPfIT Choose and Book Severity 1 incident
Lord Warner well-briefed on the NPfIT before retirement decision
Identity Management in a Virtual World
Choose and Book stalls after software upgrade
Lord Warner, minister in charge of the NHS's National Programme for IT "retires".
Neuro-Linguistic Programming – Snake Oil or Powerful Management Tool?
Regulatory Compliance - we need more detail
Managing Security Perception
More on outsourcing: software development
Joint investigation on NHS IT by Computer Weekly and Channel Four News
It's time to sort out our Information Management
Perception of outsourcing
Dirty tricks in the Name of Security
What's Your Risk Appetite?
Entering the Dark World of Cyber Crime
Return on Security Investment
Connecting for Health unilaterally changes wording of agreed statement
The Importance of Training
New software debate
Building a Secure World
Which Works Best? Point Solutions or Integrated Security?
Getting the documentation right