|
|
|
Budget cuts and continued IT Security |
|
|
Exhibitions and Trade Shows
: 01 April, 2009 |
Andrew Fourie of Astaro looks at the paradox of maintaining effective IT security systems whilst undergoing budgetary restrictions |
|
|
|
|
 |
|
|
Securing against insider threats |
|
|
Exhibitions and Trade Shows
: 01 April, 2009 |
Sacha Chahrvin of DeviceLock explains the extent of insider threats to data security and how to mitigate against them |
|
|
|
|
 |
|
|
Protecting company data from prying eyes |
|
|
Exhibitions and Trade Shows
: 16 March, 2009 |
Colin Tankard of Digital Pathways discusses the significance of the internal threat as part of a corporate IT security strategy |
|
|
|
|
 |
|
|
|
|
|
|
|
|
A look at the risks of outsourcing IT |
|
|
Exhibitions and Trade Shows
: 12 March, 2009 |
Rob Rachwald of Fortify Software offers advice on how to tackle the tricky decision as to whether and how to achieve secure outsourcing |
|
|
|
|
 |
|
|
Virtualisation and security |
|
|
Exhibitions and Trade Shows
: 09 March, 2009 |
Bill Beverley of F5 Networks examines the security implications of working in a virtualized environment |
|
|
|
|
 |
|
|
Security in the cloud examined for 2009 |
|
|
Exhibitions and Trade Shows
: 09 March, 2009 |
Pravin Mirchandani of Syphan Technologies cuts through the hype of cloud computing and examines whether 2009 will truly be the year when security as a service takes off |
|
|
|
|
 |
|
|
Fuzzing helps reveal hidden flaws |
|
|
Exhibitions and Trade Shows
: 09 March, 2009 |
Ari Takanen of Codenomicon explains a technology which can be used to bring out the flaws in commercial software that are often kept from the public eye |
|
|
|
|
 |
|
|
Sifting through unknown vulnerabilities |
|
|
Exhibitions and Trade Shows
: 09 March, 2009 |
Chris Schwartzbauer of Shavlik Technologies provides some background into intelligent discovery of hidden vulnerabilities |
|
|
|
|
 |
|
|
How to merge firewall real estates |
|
|
Exhibitions and Trade Shows
: 09 March, 2009 |
David Amnizade of Tufin Technologies clears the path to achieving merged network security during mergers and acquisitions |
|
|
|
|
 |
|
|
|
|
|
|
Payment Card Industry DSS mistakes |
|
|
Exhibitions and Trade Shows
: 09 March, 2009 |
Protegrity's Ian Schenkel highlights the top ten slip-ups made in attempts to become PCI compliant |
|
|
|
|
 |
|
|
A peak into the future of IT Security |
|
|
Trade Organisations, User Groups and Pressure Groups
: 04 March, 2009 |
Mike Small of Computer Associates assesses the changes taking place in the IT Security industry and takes a glimpse into what the future may hold |
|
|
|
|
 |
|
|
Advice on prevention of data leakage |
|
|
Data Protection
: 02 March, 2009 |
As the recession presents further opportunities for the hacking community, Mark Fullbrook of Cyber-Ark Software examines how to make their lives more difficult |
|
|
|
|
 |
|
|
Cloud computing security survey results |
|
|
Exhibitions and Trade Shows
: 19 February, 2009 |
Large proportion of organisations expect to increase their security budgets to co-incide with planned moves into Cloud Computing applications |
|
|
|
|
 |
|
|
Automated Risk and Compliance Management |
|
|
Exhibitions and Trade Shows
: 19 February, 2009 |
Gidi Cohen of Skybox Security examine IT Risk and Compliance Management and how it can be managed in a more automated fashion |
|
|
|
|
 |
|
|
|
|
|
|
Understanding open source security risks |
|
|
Exhibitions and Trade Shows
: 18 February, 2009 |
Rob Rachwald of Fortify Software explains the risks associated with Open Source Software and provides tips on optimising security |
|
|
|
|
 |
|
|
|
|
Achieving Web 2.0 security |
|
|
Exhibitions and Trade Shows
: 13 February, 2009 |
Roger Thornton of Fortify and Jennifer Bayuk provide insight into operating a Web 2.0 environment securely |
|
|
|
|
 |
|
|
An overview of Data Loss Prevention |
|
|
Exhibitions and Trade Shows
: 13 February, 2009 |
Stephen Midgley of Absolute Software provides a mechanism for preventing data from leaking out of the organization from many points |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Code review and WAP firewalls for PCI Compliance |
|
|
Payment cards and e-commerce security
: 29 January, 2009 |
Ulf Mattsson, Chief Technology Office at Protegrity provides a detailed review of attaining PCI compliance using Web Application Firewalls and Code Reviews |
|
|
|
|
 |
|
|
|
|
|
|
Growth in transient drive-by infections |
|
|
Anti-virus and anti-malware software
: 28 January, 2009 |
AVG provides detailed insight into the changing trends of malware infection mechanisms using transience and stealth to automatically deliver malicious software payloads with minimal detection risk |
|
|
|
|
 |
|
|
|
|
USB flash drive security from two directions |
|
|
Data Protection
: 28 January, 2009 |
Jason Holloway of SanDisk Enterprise Division examines the methods of preventing data from leaking out and viruses from seeping in through USB devices |
|
|
|
|
 |
|
|
|
|
The pros and cons of corporate use of Web 2.0 |
|
|
Exhibitions and Trade Shows
: 19 December, 2008 |
Alan Calder of IT Governance explains the growing use of Web 2.0 in the world of commerce and how its security exposures can be mitigated |
|
|
|
|
 |
|
|
|
|
|
|
Making security policies work for you |
|
|
Exhibitions and Trade Shows
: 15 December, 2008 |
David Aminzade of Tufin Software explains the need for more than just an IT Policy within an organisation and how to achieve full protection |
|
|
|
|
 |
|
|
|
|
|
|
Prevention of administrative account abuse |
|
|
Data Protection
: 30 October, 2008 |
Staphane Fymat, Business Development and Strategy VP of Passlogix discusses the avoidance of the kind of privileged account abuse which recently brought down San Francisco's FibreWAN network |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Skills for Security to take prominent role in IFSEC 2008 |
|
|
Training courses, Seminars and Conferences
: 10 April, 2008 |
With a series of not-to-miss seminars, the popular Apprenticeship Challenge and a conference covering a wide area of topics, Skills for Security will be taking a significant position in Europe's largest security exhibition. |
|
|
|
|
|
|
First | Prev | 2 | 3 | 4 | 5 | 6 | 7 | Next | Last |