Email Alerts
-
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff News | 16 Nov 2012
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm Stonesoft News | 15 Nov 2012
-
IT professionals too trusting of Generation Y
While most IT managers think employees stick to policy, most 18- to 30-year-olds play by their own rules, using personal devices at work News | 14 Nov 2012
-
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. News | 13 Nov 2012
-
Dogs to have their day in mobile security campaign
The UK Cyber Security Challenge has announced the winner of its Can You Talk Security? competition devised by BT and Get Safe Online News | 07 Nov 2012
-
VMware users urged to apply security patches as ESX source code leaks online
VMware is urging users to apply security patches as hackers publicly post the full source code for ESX hypervisor News | 06 Nov 2012
-
Gartner Symposium Barcelona: rewrite the rule book
Gartner is urging CIOs to change their IT budget to support a nexus of change arising from cloud, social, big data and mobile. News | 06 Nov 2012
-
UK organisations fail to address social networking risk
Unguarded corporate social networking accounts are leaving companies exposed to serious security breaches, a KPMG survey has revealed News | 05 Nov 2012
-
‘VM-aware’ viruses on the rise
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky News | 31 Oct 2012
-
Top cyber threats underline need for security awareness
Top threats in latest Microsoft Security Intelligence Report linked to social engineering, underlining need for security awareness News | 31 Oct 2012
- See More: News on Security policy and user awareness
-
CW500: Inside the government's CloudStore
The government's cloud store means an end to the big four to five-year IT projects of the past, says the CloudStore lead of the G-Cloud programme Feature
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Feature
-
CW500 Security Club: Dealing with attacks inside networks
Perimeter defences are no longer enough to keep data safe, experts told IT security leaders at the CW500 Security Club CW500
-
Opinion: Firms can’t or won’t address social networking security risks
It's a common refrain: Even companies that are aware of social networking security risks don't do anything about them. Opinion
-
Patient confidentiality policy for UK electronic health records
While electronic health records could provide valuable information in an emergency, they present patient confidentiality concerns. This Royal Holloway thesis examines the issue. Feature
-
Ministry of Defence security: IT information assurance in the MoD
The MoD should update its information assurance policy, argues Paul Shanes and Chez Ciechanowicz in this Royal Hollo2way MSc thesis article. Feature
-
Security trends 2011: Making sense of predictions
While vendors have never been known to underestimate security threats, the job of the information security pro is, nevertheless, getting harder, says UK Bureau Chief Ron Condon. Feature
-
Risk metrics: Measuring the effectiveness of an IT security control
In this article, based on an MSc thesis by Jonathan Pagett and Siaw-Lynn Ng, learn how to use risk metrics to gauge the effectiveness of IT security controls. Royal Holloway eBook Seri
-
A new approach to fighting varied types of cybercrime cases
Fighting cybercrime may seem like a losing battle considering the enemy is so well resourced. In a Royal Holloway University of London master's thesis, Anna Cevidalli and John Austen explore new approaches in the battle against cybercrime. Royal Holloway eBook Seri
-
2010 Royal Holloway information security thesis series
In this series of nine articles, recent MSc graduates from Royal Holloway University of London explain their information security research. Royal Holloway 2010
- See More: Features on Security policy and user awareness
-
BYOD: Bring your own device – or demise?
Nitin Bhas from Juniper research discusses the impact bring your own device (BYOD) polices are making on the enterprise Opinion
-
Security Think Tank: Use M&As; to reinvigorate security policy
What role do IT security professionals play in mergers and acquisitions? Opinion
-
Get serious about people risk to reduce cyber crime
Organisations can become blinded by compliance to the point where they have a false sense of assurance about managing people-related risk. Opinion
-
Security Zone: Do you need a CISO?
Does an organisation really need a chief information security officer or chief information officer? Opinion
-
Security Think Tank: Make IP theft personal
IP theft: who should be tackling it and how? Opinion
-
Security Think Tank: SABSA will go a long way in preventing IP theft
IP theft: who should be tackling it and how? Opinion
-
Security Think Tank: IP theft: Have you got all the bases covered?
IP theft: who should be tackling it and how? Opinion
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how? Opinion
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees cope Opinion
-
How history of security shows we have not learnt our lesson
There is no security control more effective than a diligent system administrator Opinion
-
Nitin Bhas on the security risks of mobile devices
Bill Goodwin talks to Nitin Bhas, senior analyst at Juniper Research about the security risks of using smartphones and tablets in the workplace and strategies for mobile security. Video
-
Computer Weekly and FT video debates: Tackling cyber crime
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues. Video
-
RSA Conference Europe coverage 2012
Read all the news coverage from RSA Conference Europe 2012, in London. guide
-
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff News
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm Stonesoft News
-
IT professionals too trusting of Generation Y
While most IT managers think employees stick to policy, most 18- to 30-year-olds play by their own rules, using personal devices at work News
-
BYOD: Bring your own device – or demise?
Nitin Bhas from Juniper research discusses the impact bring your own device (BYOD) polices are making on the enterprise Opinion
-
CW500: Inside the government's CloudStore
The government's cloud store means an end to the big four to five-year IT projects of the past, says the CloudStore lead of the G-Cloud programme Feature
-
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. News
-
Nitin Bhas on the security risks of mobile devices
Bill Goodwin talks to Nitin Bhas, senior analyst at Juniper Research about the security risks of using smartphones and tablets in the workplace and strategies for mobile security. Video
-
Security Think Tank: Use M&As; to reinvigorate security policy
What role do IT security professionals play in mergers and acquisitions? Opinion
-
Dogs to have their day in mobile security campaign
The UK Cyber Security Challenge has announced the winner of its Can You Talk Security? competition devised by BT and Get Safe Online News
-
Get serious about people risk to reduce cyber crime
Organisations can become blinded by compliance to the point where they have a false sense of assurance about managing people-related risk. Opinion
- See More: All on Security policy and user awareness