Category Archives: 6. Evolution of Cybersecurity

Data security strategies and drivers

Audience – Sales and pre-sales audience selling to large enterprises and government Occasion – Annual[...]

Security: Get the board on board

While the principles of IT security are relatively timeless and straightforward to understand, technology itself[...]

Rethinking security. Just what are you trying to secure?

Ask any IT manager, business leader or regulator and they will tell you that IT[...]

Application Retirement: What about the Data?

by Jon Collins and Martin Atherton Introducing application retirement: what’s really important to you? Whatever[...]

Should all hard drives be encrypted?

Given the origins of computing in the coding and decoding of messages, it’s fair to[...]

Securing the Un-securable?

Audience – IT security practitioners and academics Occasion – BCS Information Security Special Interest Group[...]

Dedication to regulation

By Martin Atherton Regulation is a fact of life and business. The signs are that[...]

Virtualisation and Security

As x86 / x64 server virtualisation moves into everyday operations, what impact does it have[...]

Data protection and identity management – are you sure you’re safe?

Data protection is an essential area for businesses, and an increasingly critical one to deal[...]

Is your data safe – and accessible?

Data protection has been a requirement and an obligation for organisations of all sizes since[...]

Threat predictions for 2010

Jon Collins and Paul Wood of MessageLabs give their predictions for the coming year on[...]

How bad are the bad guys?

By Jon Collins The Internet has come a long way since its rudimentary beginnings as[...]

Looking at the threat landscape – It’s getting scary out there….

Jon Collins and MessageLabs’ Paul Wood examine some of the current threats we all face,[...]

Delivering on identity and access management

By Jon Collins At a recent panel event involving senior security managers and chief information[...]

Making IT Work In The Real World

Most organisations run a mix of systems in their IT infrastructure. One of the challenges[...]

IT security and Governance

By Jon Collins It has sometimes been said that in Information Technology, the emphasis has[...]

Data Retention

by Jon Collins and Martin Atherton Earlier last year we conducted some research on the[...]

Resiliency in the Real World

by Tony Lock A recent report by Freeform Dynamics shows that IT systems fail. What‟s[...]

The Impact of IT Security Attitudes

by Jon Collins Much has been written about the existence of various threats, internal and[...]

Email resiliency and the SMB

by Martin Atherton For most businesses, IT is linked to multiple facets of activity: product[...]

Secure USB

by Jon Collins When the USB standard was first launched, few would have imagined the[...]

Risk and Resilience

The application availability gamble The modern business is highly dependent on IT. When systems go[...]

What governance can really mean to business

by Martin Atherton Governance is a term you’ll have heard bandied about a lot, usually[...]

Data Governance in the Software Lifecycle

by Martin Atherton, Jon Collins and Dale Vile Many organisations have been driving improvements in[...]

© Freeform Dynamics Limited - 2006 - 2024. All rights reserved. Unauthorised use of copy is not permitted.