Category Archives: IT Security, Risk & ESG
The cloud’s impact on security?
We tried to get through this workshop without using the five letter C-word, but we[...]
Mobile technology and security
By Josie Sephton In a nutshell: The issue of security when thinking about flexible working[...]
Threat or opportunity?
By Martin Atherton In a nutshell: When it comes to data protection and information security[...]
Driving With the Brakes On
By Jon Collins In a nutshell: While much attention around information risk is on medium[...]
Security – policies, processes and people
The problem with building foolproof systems, so the saying goes, is that the world seems[...]
Does business really care about security?
I once read a book that said, among other things, “You can never truly give[...]
Delivering on data governance – Making sure IT’s glass is half full
Data governance can be dismissed as ‘applied common sense’, or balked at as an impossible[...]
Should we be encrypting backups?
We all know that data protection regulations are gaining teeth. As we discussed before, it[...]
Is it possible to measure IT Security?
It is a commonly held principle in many areas of business that if you can’t[...]
Delivering a secure information infrastructure
I recently had the task of writing an explanatory paper about Good Practice Guide (GPG)[...]
Protective Monitoring
by Jon Collins and Martin Atherton MAIN POINTS CESG (Communications and Electronic Security Group) Good[...]
The impact of virtualisation on securing systems
Virtualisation has become an established trend in the x86 server market and is moving into[...]
Using systems management tools in IT security
Every IT professional recognises the importance of securing the IT systems that are now at[...]
The evolving role of the IT security manager
Security has long been the poor cousin of IT. As any security professional knows, the[...]
Securing Your Network
In this three part podcast Jason Stamper, editor at CBR, talks to Jon Collins and[...]
Data security strategies and drivers
Audience – Sales and pre-sales audience selling to large enterprises and government Occasion – Annual[...]
Security: Get the board on board
While the principles of IT security are relatively timeless and straightforward to understand, technology itself[...]
Rethinking security. Just what are you trying to secure?
Ask any IT manager, business leader or regulator and they will tell you that IT[...]
Application Retirement: What about the Data?
by Jon Collins and Martin Atherton Introducing application retirement: what’s really important to you? Whatever[...]
Should all hard drives be encrypted?
Given the origins of computing in the coding and decoding of messages, it’s fair to[...]
Securing the Un-securable?
Audience – IT security practitioners and academics Occasion – BCS Information Security Special Interest Group[...]
Dedication to regulation
By Martin Atherton Regulation is a fact of life and business. The signs are that[...]
Virtualisation and Security
As x86 / x64 server virtualisation moves into everyday operations, what impact does it have[...]
Data protection and identity management – are you sure you’re safe?
Data protection is an essential area for businesses, and an increasingly critical one to deal[...]