|
|
|
Fending off the modern day barbarians |
|
|
Network Security, Routers and Data Centres
: 20 July, 2016 |
Dan Joe Barry of Napatech uses the analogy of Hadrians Wall to illustrate existing approaches to network security and how to take a more modern stance |
|
|
|
|
 |
|
|
IoT security challenge survey |
|
|
Network Security, Routers and Data Centres
: 21 June, 2016 |
ForeScout Technologies releases findings from a survey into enterprise security and the the Internet of Things or IoT |
|
|
|
|
 |
|
|
Is NAC already old terminology? |
|
|
Network Security, Routers and Data Centres
: 26 May, 2016 |
John Carney of ForeScout explains that effective NAC servers act as far more than just user or device gateways to the corporate network |
|
|
|
|
 |
|
|
Securing networks in the 100Gbps era |
|
|
Network Security, Routers and Data Centres
: 18 May, 2016 |
Dan Joe Barry of Napatech details the different approach needed to keep up with data growth and the high speed networks of today, requiring the Last Security Tool |
|
|
|
|
 |
|
|
|
|
|
|
A guide to tackling cybercrime in 2016 |
|
|
Anti-virus and anti-malware software
: 18 February, 2016 |
David Emm of Kaspersky Lab describes the requirements for the correct mix of skills, strategy and security in order to be able to combat cyber crime |
|
|
|
|
 |
|
|
Choosing the right body armour |
|
|
PPE, Clothing and Uniforms
: 15 February, 2016 |
SafeGuard Armour explains the different types of body armour available and what factors influence choices of armour made by security operatives |
|
|
|
|
 |
|
|
|
|
Lack of encryption leads to fine for CPS |
|
|
Data encryption
: 09 November, 2015 |
ViaSat blames lack of encryption for the risks posed during the data breach at the CPS potentially exposing video material of victim and witness interviews |
|
|
|
|
 |
|
|
|
|
|
|
Ransomware spreads as complacency grows |
|
|
Anti-virus and anti-malware software
: 14 October, 2015 |
David Emm, principal security researcher at Kaspersky Lab explains the growing danger of ransomware and how businesses are taking large risks by not addressing the trend |
|
|
|
|
 |
|
|
Handling end user privacy expectations |
|
|
Data Protection
: 28 September, 2015 |
Agathe Caffier, Senior Counsel of International Operations & Privacy Specialist at DMI explains privace expectations of users and how best to handle them in policies and software design |
|
|
|
|
 |
|
|
The anatomy of application layer DDoS Attacks |
|
|
Anti-virus and anti-malware software
: 23 September, 2015 |
Rishi Agarwal of NSFocus explains Layer 7 or application layer DDoS attacks and the approach needed to secure against them |
|
|
|
|
 |
|
|
EU data regulation preparations |
|
|
Data Protection
: 21 September, 2015 |
Rob Norris, Director of Enterprise and Cyber Security for UK and Ireland at Fujitsu discusses the development of cyber resilience required by companies to meet the 2017 requirements of the new EU data regulations |
|
|
|
|
 |
|
|
|
|
Secure data centre for Belgian Bank |
|
|
Network Security, Routers and Data Centres
: 03 September, 2015 |
Delen Private Bank in Belgium has chosen ICTroom to supply its secure corporate data centre in Antwerp |
|
|
|
|
 |
|
|
|
|
Stopping the insider threat |
|
|
Data Protection
: 10 August, 2015 |
Francois Amigorena of IS Decisions asks if your organisation has the perfect insider threat programme |
|
|
|
|
 |
|
|
The IoT Botnets are Coming: Are You Prepared? |
|
|
Data Protection
: 07 August, 2015 |
Rishi Agarwal of NSFOCUS provides some insight into the security vulnerabilities associated with the Internet of Things and what is being done to prevent them from being exploited |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Considerations for taking out cyber insurance |
|
|
Internet Security and Content Filtering
: 20 May, 2015 |
Charles Sweeney, CEO of Bloxx, examines the case for commercial cyber liability insurance and what steps companies can take to reduce risk and premiums |
|
|
|
|
 |
|
|
Protection of information from visual hacking |
|
|
Data Protection
: 20 May, 2015 |
Peter Harley of 3M explains how companies could be losing information through leaving screens exposed to people able to see content over the users shoulder |
|
|
|
|
 |
|
|
Tackling Today’s Authentication Complexities |
|
|
Authentication
: 07 April, 2015 |
Jason Hart, vice president, Cloud Solutions for Identity & Data Protection at Gemalto highlights the importance for organisations to adopt an appropriate authentication environment |
|
|
|
|
 |
|
|
IT security company evolution |
|
|
Anti-virus and anti-malware software
: 02 April, 2015 |
Kirill Slavin, General Manager, Kaspersky Lab UK and Ireland, explains Why diversify or die doesn’t always ring true in an ever-evolving IT security market place |
|
|
|
|
 |
|
|
|
|
Matching security to increased network performance |
|
|
Network Security, Routers and Data Centres
: 26 March, 2015 |
Dan Joe Barry, a Vice President at Napatech, examines the need for greater focus on network performance when deploying network security systems |
|
|
|
|
 |
|
|
Three key IT security focus areas identified |
|
|
Data Protection
: 19 March, 2015 |
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks |
|
|
|
|
 |
|
|
Key actions needed to ensure digital safety |
|
|
Data Protection
: 10 March, 2015 |
John Swanson, Head of Security Offerings and Strategy in UK & Ireland at Fujitsu, examines the route that businesses need to take to ensure they can become digitally safe |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Five steps to secure iterative software delivery |
|
|
Data Protection
: 18 February, 2015 |
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Beyond access control with next-generation NAC |
|
|
Network Security, Routers and Data Centres
: 02 February, 2015 |
Fran Howarth, senior analyst for security at Bloor Research explains how next-generation Network Access Control (NAC) is capable of defending against rogue users, devices and applications |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
Lessons learned from 2014, the year of the breach |
|
|
Anti-virus and anti-malware software
: 05 January, 2015 |
Michael Aminzade, VP Global Compliance & Risk Services at Trustwave reflects on another year of breaches and discusses what organisations can do to help protect themselves from being attacked. |
|
|
|
|
 |
|
|
Lessons learned from 2014 – The year of the breach |
|
|
Anti-virus and anti-malware software
: 18 December, 2014 |
Michael Aminzade, VP Global Compliance & Risk Services at Trustwave reflects on another year of breaches and discusses what organisations can do to help protect themselves from being attacked. |
|
|
|
|
|
|
First | Prev | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Next | Last |