Email Alerts
-
UK Border Agency tenders for security systems
The UK Border Agency (UKBA) and Border Force is tendering for an integrated border security system News | 09 Jan 2013
-
US military gets new software testing rules
The US has introduced new policies for military software engineers aimed at pre-empting software supply chain attacks News | 09 Jan 2013
-
Businesses overconfident about cyber security, says Deloitte
Businesses are overconfident about cyber security and should treat security breaches as inevitable, says business advisory firm Deloitte News | 08 Jan 2013
-
UK to launch public cyber security awareness campaign
The UK government is to launch a public cyber security awareness programme early this year aimed at consumers and small businesses Cyber security | 03 Jan 2013
-
Malware spammers target Android OS
Google’s mobile operating system, Android, has been hit again by malicious malware causing devices to send out spam SMS messages News | 19 Dec 2012
-
MPs slam draft Communications Data Bill
MPs have slammed plans to give the Home Secretary carte blanche to retain any type of data in the draft Communications Data Bill dubbed ‘the Snoopers’ Charter’. News | 11 Dec 2012
-
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. News | 06 Dec 2012
-
Orange to pre-install mobile security on Android phones in 2013
Orange Android devices will come pre-installed with the Lookout Mobile Security application to counter malware and spyware News | 04 Dec 2012
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Security | 03 Dec 2012
-
Cybergeddon unlikely, say experts
Cybergeddon, a complete takedown of the internet, is within the power of some nation states, but unlikely, say security industry experts News | 29 Nov 2012
- See more News on Security policy and user awareness
-
CW500: Inside the government's CloudStore
The government's cloud store means an end to the big four to five-year IT projects of the past, says the CloudStore lead of the G-Cloud programme Feature
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Feature
-
CW500 Security Club: Dealing with attacks inside networks
Perimeter defences are no longer enough to keep data safe, experts told IT security leaders at the CW500 Security Club CW500
-
The new EU data protection regulation: Planning for compliance
The new data protection rule will impact businesses worldwide. Discover quick wins for SMBs and projects for large businesses to move to compliance. Tip
-
“Click-for-tickets” fraud: Teaching users to sidestep Olympic scams
Attackers are expected to use the Games to foster email and Internet fraud. Learn how to help users sidestep Olympics-related scams. Tip
-
Adding cybercrime software demos to security awareness training
Security professionals can use screenshots of cybercrime software in security awareness training to convey the serious threats organisations face. Tip
-
International computer crime requires an international response
As international computer crime increases in scope and organisation, countries must work together to reduce threats from global cybercrime. Opinion
-
Finding Mobile device security training courses for IT admins
Expert Davey Winder suggests some good security training courses for the IT administrator who must manage their organisation’s mobile devices. Ask the Expert
-
A compliance strategy for the controversial cookie opt-in regulation
Businesses face many concerns with the PECR cookie law. Compliance expert Alan Calder offers a compliance strategy for the cookie opt-in regulation. Tip
-
Four steps to comply with PECR, ICO cookies regulations
To comply with ICO regulations, you’ll need to clean up website cookies and prepare pop-up permission requests. Alan Calder explains how. Tip
- See more Features on Security policy and user awareness
-
Don’t get spiked by a spear phisher
How to avoid the latest hacking techniques: the telltale signs that a spear phishing attack is in action; how to deflect it; and how to contain damage Opinion
-
BYOD: Bring your own device – or demise?
Nitin Bhas from Juniper research discusses the impact bring your own device (BYOD) polices are making on the enterprise Opinion
-
Security Think Tank: Use M&As; to reinvigorate security policy
What role do IT security professionals play in mergers and acquisitions? Opinion
-
Get serious about people risk to reduce cyber crime
Organisations can become blinded by compliance to the point where they have a false sense of assurance about managing people-related risk. Opinion
-
Security Zone: Do you need a CISO?
Does an organisation really need a chief information security officer or chief information officer? Opinion
-
Security Think Tank: Make IP theft personal
IP theft: who should be tackling it and how? Opinion
-
Security Think Tank: SABSA will go a long way in preventing IP theft
IP theft: who should be tackling it and how? Opinion
-
Security Think Tank: IP theft: Have you got all the bases covered?
IP theft: who should be tackling it and how? Opinion
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how? Opinion
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees cope Opinion
- See more Opinion on Security policy and user awareness
-
Video: Why IT departments are spending more on security
In this video, Forrester analyst Andrew Rose discusses how chief information security officers are spending their buidgets Video
-
Financial Times and Computer Weekly: IT security
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues. Video
-
Nitin Bhas on the security risks of mobile devices
Bill Goodwin talks to Nitin Bhas, senior analyst at Juniper Research about the security risks of using smartphones and tablets in the workplace and strategies for mobile security. Video
-
Computer Weekly and FT video debates: Tackling cyber crime
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues. Video
-
RSA Conference Europe coverage 2012
Read all the news coverage from RSA Conference Europe 2012, in London. guide
-
UK Border Agency tenders for security systems
The UK Border Agency (UKBA) and Border Force is tendering for an integrated border security system News
-
US military gets new software testing rules
The US has introduced new policies for military software engineers aimed at pre-empting software supply chain attacks News
-
Businesses overconfident about cyber security, says Deloitte
Businesses are overconfident about cyber security and should treat security breaches as inevitable, says business advisory firm Deloitte News
-
UK to launch public cyber security awareness campaign
The UK government is to launch a public cyber security awareness programme early this year aimed at consumers and small businesses Cyber security
-
Malware spammers target Android OS
Google’s mobile operating system, Android, has been hit again by malicious malware causing devices to send out spam SMS messages News
-
Video: Why IT departments are spending more on security
In this video, Forrester analyst Andrew Rose discusses how chief information security officers are spending their buidgets Video
-
Financial Times and Computer Weekly: IT security
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues. Video
-
MPs slam draft Communications Data Bill
MPs have slammed plans to give the Home Secretary carte blanche to retain any type of data in the draft Communications Data Bill dubbed ‘the Snoopers’ Charter’. News
-
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. News
-
Orange to pre-install mobile security on Android phones in 2013
Orange Android devices will come pre-installed with the Lookout Mobile Security application to counter malware and spyware News
- See more All on Security policy and user awareness