Category Archives: IT Security, Risk & ESG

Moving beyond user rights – Protecting data first

It goes without saying that IT systems should, in principle, be secured so that only[...]

Is there a case for encrypting backups?

For most organisations, backups form an essential part of the day to day activities of[...]

Managing IT and business risk in the times of eroding enterprise boundaries

Managing risk in business has always been more of an art form than a science.[...]

Solvency II: Threat or Opportunity?

By Dale Vile and Jon Collins INTRODUCTION The emergence of new regulation always presents a[...]

Collaboration, complexity and compliance

The trouble with some terms we use in IT is that they take on a[...]

Who cares about encryption?

We’re used to getting a hundred or so responses from the mini-polls we run, but[...]

The terror beyond the firewall

“The office” is fast becoming, for many organisations, a thing of the past – at[...]

Doing the right thing on ID management isn’t enough. It’s proving that you did it

In a previous article we looked at Identity Management and access provisioning as an end[...]

Those demanding mobile users

For years, when we asked Reg readers what worried them about mobile, “security” was top[...]

The cloud’s impact on security?

We tried to get through this workshop without using the five letter C-word, but we[...]

Mobile technology and security

By Josie Sephton In a nutshell: The issue of security when thinking about flexible working[...]

Threat or opportunity?

By Martin Atherton In a nutshell: When it comes to data protection and information security[...]

Driving With the Brakes On

By Jon Collins In a nutshell: While much attention around information risk is on medium[...]

Security – policies, processes and people

The problem with building foolproof systems, so the saying goes, is that the world seems[...]

Does business really care about security?

I once read a book that said, among other things, “You can never truly give[...]

Delivering on data governance – Making sure IT’s glass is half full

Data governance can be dismissed as ‘applied common sense’, or balked at as an impossible[...]

Should we be encrypting backups?

We all know that data protection regulations are gaining teeth. As we discussed before, it[...]

Is it possible to measure IT Security?

It is a commonly held principle in many areas of business that if you can’t[...]

Delivering a secure information infrastructure

I recently had the task of writing an explanatory paper about Good Practice Guide (GPG)[...]

Protective Monitoring

by Jon Collins and Martin Atherton MAIN POINTS CESG (Communications and Electronic Security Group) Good[...]

The impact of virtualisation on securing systems

Virtualisation has become an established trend in the x86 server market and is moving into[...]

Using systems management tools in IT security

Every IT professional recognises the importance of securing the IT systems that are now at[...]

The evolving role of the IT security manager

Security has long been the poor cousin of IT. As any security professional knows, the[...]

Securing Your Network

In this three part podcast Jason Stamper, editor at CBR, talks to Jon Collins and[...]

© Freeform Dynamics Limited - 2006 - 2024. All rights reserved. Unauthorised use of copy is not permitted.