|
Secure Shell Key Management and Retrieval Guide |
|
|
Data Protection
: 13 August, 2013 |
Jason Thompson, global director of marketing for SSH Communications Security explores secure shell key management and asks who it is who has the keys to your server |
|
|
|
|
 |
|
|
|
|
Ten tips on mitigating information risk |
|
|
Data Protection
: 02 July, 2013 |
Marc Duale, President International at Iron Mountain shares some of the lessons learnt by companies and passed on to others on protecting company information |
|
|
|
|
 |
|
|
|
|
|
|
Factoring security into cloud architectures |
|
|
Cloud Computing Security
: 29 May, 2013 |
James Carnie, the head of solutions architecture at Adapt provides insight into achieving the right balance between flexibility and security in the cloud |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Explosive growth in Android malware |
|
|
Mobile computing security
: 14 January, 2013 |
Ninety-nine percent of smartphone malware discovered during 2012 targeted the popular Android platform |
|
|
|
|
 |
|
|
|
|
|
|
ISACA Speculates On the Next Trend Beyond BYOD |
|
|
Trade Organisations, User Groups and Pressure Groups
: 10 September, 2012 |
Christos Dimitriadis of ISACA looks into the background of BYOD (Bring Your Own Device) and uses it to foretell the future of network security and predict what will BYOD V2 be |
|
|
|
|
 |
|
|
|
|
Securing Against The Evolution of Malware |
|
|
Anti-virus and anti-malware software
: 29 August, 2012 |
Jamie Bodley-Scott of Cryptzone examines the growth of malware since the birth of the PC and what organisations need to do to meet the changing face of security protection |
|
|
|
|
 |
|
|
Cloud Computing And The Dangers Of A Slothful Approach |
|
|
Trade Organisations, User Groups and Pressure Groups
: 29 August, 2012 |
Being sluggish in comprehending the cloud computing environment that a business is adopting can lead to problems as explained by Mike Small of ISACA |
|
|
|
|
 |
|
|
Ten Reasons For Reducing Privileged Access |
|
|
Data Protection
: 15 August, 2012 |
Paul Kenyon of Avecto provides ten good reasons why every organisation should implement a policy of user privileges that minimises risk |
|
|
|
|
 |
|
|
IPV6 Effects on Firewall Management |
|
|
Network Security, Routers and Data Centres
: 11 July, 2012 |
Reuven Harrison of Tufin Technologies provides insight into the transition to IPv6 and what this will mean for firewall management |
|
|
|
|
 |
|
|
Holographic Protection of Intellectual Property |
|
|
Trade Organisations, User Groups and Pressure Groups
: 26 January, 2012 |
Glenn Wood of the International Hologram Manufacturers Association provides details about the protection of intellectual property rights and the role that holography plays in this increasingly prominent role |
|
|
|
|
 |
|
|
|
|
|
|
Best Practice IT Security Policy Management |
|
|
Data Protection
: 14 October, 2011 |
Dominic Saunders of Cryptzone provides the six steps needed to achieve IT security policy excellence for balancing the mitigation of risk with commercial requirements |
|
|
|
|
 |
|
|
|
|
Intelligent Surveillance In The Prevention Of Retail Crime |
|
|
IP and Megapixel cameras
: 16 September, 2011 |
Quadrox provides information on how modern High Definition CCTV surveillance systems provide more than a watching eye in the retail industry and can make a significant contribution towards reducing retail shrinkage |
|
|
|
|
 |
|
|
Defeating Denial Of Service Attacks |
|
|
Anti-virus and anti-malware software
: 05 September, 2011 |
Imperva Product Manager examines DDos Attacks and looks at how they can be defeated |
|
|
|
|
 |
|
|
Trusteer Dispels The Myths Around Mobile Malware |
|
|
Mobile computing security
: 16 August, 2011 |
Amit Klein of Trusteer explains why malware delivered to mobile devices should be taken seriously because the market is now ripe for cyber-criminals to exploit |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Smartphone Security Timebomb Continues Ticking |
|
|
Mobile computing security
: 12 July, 2011 |
Trusteer explains why hackers are two steps ahead of the mobile security industry and are ready to exploit vulnerabilities on Android and iOS devices when they become more widely used for on-line mobile banking applications |
|
|
|
|
 |
|
|
Living Dangerously With New Technology |
|
|
Data Protection
: 30 June, 2011 |
Jane Grafton, Director of Business Development at Lieberman Software takes a look at the pitfalls facing IT security professionals and provides five simple rules for keeping your job |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
Ensuring Security On Corporate Mobile Devices |
|
|
Mobile computing security
: 16 June, 2011 |
WIth the security edges continuing to become more blurred in portable computing, Origin Storage examines the growing requirements for security solutions for the protection of smartphones and other mobile computing devices |
|
|
|
|
 |
|
|
IT Outsourcing Golden Rules |
|
|
Cloud Computing Security
: 15 June, 2011 |
Philip Lieberman answers the question of how to successfully implement an outsourcing program without exposing your company to the inherent dangers |
|
|
|
|
 |
|
|
|
|
|
|
Cutting IT Security Spending Wisely |
|
|
Exhibitions and Trade Shows
: 12 April, 2011 |
In the light of Government spending cuts in the UK, Will Hogan of Idappcom examines the ways available to reduce spending without reducing the levels of protection required in the corporate environment |
|
|
|
|
 |
|
|
|
|
|
|
The Use Of Self-Encrypting Drives For Data Protection |
|
|
Exhibitions and Trade Shows
: 18 March, 2011 |
Michael Willett of Trusted Computing Group explains the difference between Self Encrypting Drives and Software-based Full Drive Encryption when it comes to ability to protect data |
|
|
|
|
 |
|
|
|
|
Lone Worker Protection Risk Assessment |
|
|
Lone Worker Protection and Personal Alarms
: 10 March, 2011 |
Craig Swallow of Connexion2 provides detailed insight into the subject of Lone Worker Protection and explains what constitutes a lone worker and what duties organisations have towards their protection |
|
|
|
|
 |
|
|
Securing Personal Laptops For Business Use |
|
|
Data Protection
: 07 March, 2011 |
With the increasing trend of companies providing a stipend to employees to buy their own laptops for both business and personal use, Nick Lowe of Check Point examines the security implications of this cost-saving measure |
|
|
|
|
 |
|
|
Guide To Achieving PCI DSS Compliance |
|
|
Software Asset Management and Compliance
: 03 March, 2011 |
David Gibson of Varonis Systems provides a detailed guide to Data Security Standard compliance with the Payment Card Industry |
|
|
|
|
 |
|
|
Insider Threat Risk Reduction |
|
|
Data Protection
: 17 February, 2011 |
Sean Glynn of Credant Technologies offers some insight into the theft of commercial information from people inside the organisation and investigates methods that can be used to reduce the threat of insider data theft |
|
|
|
|
 |
|
|
Managing The Lifecycle Of Firewall Rules |
|
|
Network Security, Routers and Data Centres
: 31 January, 2011 |
Reuven Harrison of network security specialist company Tufin Technologies examines the tortuous process map for managing change on firewalls and provides advice on simplifying the process and gaining effective management of the rule lifecycle |
|
|
|
|
 |
|
|
|
|
First | Prev | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Next | Last |