Category Archives: 6. Evolution of Cybersecurity
Data security strategies and drivers
Audience – Sales and pre-sales audience selling to large enterprises and government Occasion – Annual[...]
Security: Get the board on board
While the principles of IT security are relatively timeless and straightforward to understand, technology itself[...]
Rethinking security. Just what are you trying to secure?
Ask any IT manager, business leader or regulator and they will tell you that IT[...]
Application Retirement: What about the Data?
by Jon Collins and Martin Atherton Introducing application retirement: what’s really important to you? Whatever[...]
Should all hard drives be encrypted?
Given the origins of computing in the coding and decoding of messages, it’s fair to[...]
Securing the Un-securable?
Audience – IT security practitioners and academics Occasion – BCS Information Security Special Interest Group[...]
Dedication to regulation
By Martin Atherton Regulation is a fact of life and business. The signs are that[...]
Virtualisation and Security
As x86 / x64 server virtualisation moves into everyday operations, what impact does it have[...]
Data protection and identity management – are you sure you’re safe?
Data protection is an essential area for businesses, and an increasingly critical one to deal[...]
Is your data safe – and accessible?
Data protection has been a requirement and an obligation for organisations of all sizes since[...]
Threat predictions for 2010
Jon Collins and Paul Wood of MessageLabs give their predictions for the coming year on[...]
How bad are the bad guys?
By Jon Collins The Internet has come a long way since its rudimentary beginnings as[...]
Looking at the threat landscape – It’s getting scary out there….
Jon Collins and MessageLabs’ Paul Wood examine some of the current threats we all face,[...]
Delivering on identity and access management
By Jon Collins At a recent panel event involving senior security managers and chief information[...]
Making IT Work In The Real World
Most organisations run a mix of systems in their IT infrastructure. One of the challenges[...]
IT security and Governance
By Jon Collins It has sometimes been said that in Information Technology, the emphasis has[...]
Data Retention
by Jon Collins and Martin Atherton Earlier last year we conducted some research on the[...]
Resiliency in the Real World
by Tony Lock A recent report by Freeform Dynamics shows that IT systems fail. What‟s[...]
The Impact of IT Security Attitudes
by Jon Collins Much has been written about the existence of various threats, internal and[...]
Email resiliency and the SMB
by Martin Atherton For most businesses, IT is linked to multiple facets of activity: product[...]
Secure USB
by Jon Collins When the USB standard was first launched, few would have imagined the[...]
Risk and Resilience
The application availability gamble The modern business is highly dependent on IT. When systems go[...]
What governance can really mean to business
by Martin Atherton Governance is a term you’ll have heard bandied about a lot, usually[...]
Data Governance in the Software Lifecycle
by Martin Atherton, Jon Collins and Dale Vile Many organisations have been driving improvements in[...]