Category Archives: IT Security, Risk & ESG
Putting the SaaS into security management
In all areas of business, security and privacy are built on good policy, properly applied.[...]
Is cloud data secure?
Would your data be more secure in the hands of Google or left where it[...]
A question of performance
Software as a service (SaaS) promises a lot but many are still nervous about relying[...]
Trust and risk in the cloud
Stick enough kit and multi-tenant software in one huge data centre and there is no[...]
What is the point of End Point Protection?
How we should be protecting our PCs Security threats have existed for almost as long[...]
The alternatives to password protection
In a world where it is possible to create credential-stealing malware and where users are[...]
The perception and reality of cloud security
Some back to front thinking in evidence? One of the most frequent concerns about cloud[...]
Modern solutions to an ever-growing challenge
What could be new about backup and recovery? After all, everyone has been doing it[...]
Disaster recovery blurs into high availability (or other way round?)
IT managers use two terms when talking about systems availability. These are: High Availability or[...]
Shaping your next desktop upgrade
The economic downturn caused many companies to delay their desktop and notebook refresh plans, but[...]
The industrialisation of the IT Threat Landscape
Business and IT are now changing with a rapidity never before seen while at the[...]
CIOs and ’Data Protection’
By Tony Lock The rapid growth in the amount of stored data means that the[...]
Data encryption adoption represents a significant opportunity
By Andrew Buss Data protection continues to be a top of mind subject for many[...]
Keys to data encryption adoption
Data protection remains top-of-mind for many companies. Data losses continue across both public and private[...]
The threat and promise of server virtualisation security
Given that IT security is all about understanding, and mitigating risks, it is inevitably going[...]
Moving beyond user rights – Protecting data first
It goes without saying that IT systems should, in principle, be secured so that only[...]
Is there a case for encrypting backups?
For most organisations, backups form an essential part of the day to day activities of[...]
Managing IT and business risk in the times of eroding enterprise boundaries
Managing risk in business has always been more of an art form than a science.[...]
Solvency II: Threat or Opportunity?
By Dale Vile and Jon Collins INTRODUCTION The emergence of new regulation always presents a[...]
Collaboration, complexity and compliance
The trouble with some terms we use in IT is that they take on a[...]
Who cares about encryption?
We’re used to getting a hundred or so responses from the mini-polls we run, but[...]
The terror beyond the firewall
“The office” is fast becoming, for many organisations, a thing of the past – at[...]
Doing the right thing on ID management isn’t enough. It’s proving that you did it
In a previous article we looked at Identity Management and access provisioning as an end[...]
Those demanding mobile users
For years, when we asked Reg readers what worried them about mobile, “security” was top[...]