Category Archives: IT Security, Risk & ESG
Moving beyond user rights – Protecting data first
It goes without saying that IT systems should, in principle, be secured so that only[...]
Is there a case for encrypting backups?
For most organisations, backups form an essential part of the day to day activities of[...]
Managing IT and business risk in the times of eroding enterprise boundaries
Managing risk in business has always been more of an art form than a science.[...]
Solvency II: Threat or Opportunity?
By Dale Vile and Jon Collins INTRODUCTION The emergence of new regulation always presents a[...]
Collaboration, complexity and compliance
The trouble with some terms we use in IT is that they take on a[...]
Who cares about encryption?
We’re used to getting a hundred or so responses from the mini-polls we run, but[...]
The terror beyond the firewall
“The office” is fast becoming, for many organisations, a thing of the past – at[...]
Doing the right thing on ID management isn’t enough. It’s proving that you did it
In a previous article we looked at Identity Management and access provisioning as an end[...]
Those demanding mobile users
For years, when we asked Reg readers what worried them about mobile, “security” was top[...]
The cloud’s impact on security?
We tried to get through this workshop without using the five letter C-word, but we[...]
Mobile technology and security
By Josie Sephton In a nutshell: The issue of security when thinking about flexible working[...]
Threat or opportunity?
By Martin Atherton In a nutshell: When it comes to data protection and information security[...]
Driving With the Brakes On
By Jon Collins In a nutshell: While much attention around information risk is on medium[...]
Security – policies, processes and people
The problem with building foolproof systems, so the saying goes, is that the world seems[...]
Does business really care about security?
I once read a book that said, among other things, “You can never truly give[...]
Delivering on data governance – Making sure IT’s glass is half full
Data governance can be dismissed as ‘applied common sense’, or balked at as an impossible[...]
Should we be encrypting backups?
We all know that data protection regulations are gaining teeth. As we discussed before, it[...]
Is it possible to measure IT Security?
It is a commonly held principle in many areas of business that if you can’t[...]
Delivering a secure information infrastructure
I recently had the task of writing an explanatory paper about Good Practice Guide (GPG)[...]
Protective Monitoring
by Jon Collins and Martin Atherton MAIN POINTS CESG (Communications and Electronic Security Group) Good[...]
The impact of virtualisation on securing systems
Virtualisation has become an established trend in the x86 server market and is moving into[...]
Using systems management tools in IT security
Every IT professional recognises the importance of securing the IT systems that are now at[...]
The evolving role of the IT security manager
Security has long been the poor cousin of IT. As any security professional knows, the[...]
Securing Your Network
In this three part podcast Jason Stamper, editor at CBR, talks to Jon Collins and[...]