Security policy and user awareness
-
Feature
19 Nov 2024
Storage technology explained: Ransomware and storage and backup
We look at ransomware attacks, and the importance of good backup practice as well as immutable snapshots, air-gapping, network segmentation, AI anomaly detection and supplier warranties Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
19 Nov 2024
Underfunded, under pressure: We must act to support cyber teams
With almost half of cyber pros experiencing more incidents this year, security leaders say their teams are coming under increasing strain. Businesses must be more proactive approach about building a resilient, future-ready workforce Continue Reading
-
News
25 Jan 2013
Encryption is safe bet, says SafeNet
Encryption is the only thing that can give peace of mind to CIOs and CISOs, says Dave Hansen, president and CEO of security firm SafeNet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Jan 2013
Security visualisation
This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities Continue Reading
-
News
09 Jan 2013
UK Border Agency tenders for security systems
The UK Border Agency (UKBA) and Border Force is tendering for an integrated border security system Continue Reading
By- Kathleen Hall, TechTarget
-
Photo Story
07 Dec 2012
Highlights from PwC’s State of Information Security Survey, India 2013
We bring you excerpts from PwC’s India survey on the state of information security as part of this photofeature. Continue Reading
By- SearchSecurity.in staff
-
News
06 Dec 2012
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. Continue Reading
-
News
03 Dec 2012
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Continue Reading
-
News
19 Nov 2012
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI Software Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Nov 2012
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Nov 2012
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. Continue Reading
-
News
31 Oct 2012
‘VM-aware’ viruses on the rise
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky Continue Reading
By- Jennifer Scott, TechTarget
-
News
25 Oct 2012
ICO hits Stoke-on-Trent City Council with £120,000 fine
Stoke City Council has breached the Data Protection Act, for the second time in two years, after details of a child protection legal case were emailed to the wrong person. Continue Reading
By- Jennifer Scott, TechTarget
-
Feature
10 Oct 2012
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
17 Sep 2012
Android devices vulnerable to security breaches
More than 50% of devices running Google's Android OS have unpatched vulnerabilities, opening them up to malicious apps and other attacks Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Sep 2012
IT security awareness needs to be company-wide, says (ISC)²
Information security awareness needs to be more robust, started as early as possible, continually reinforced and organisation-wide, says Julie Peeler, director, (ISC)² Foundation Continue Reading
By- Warwick Ashford, Senior analyst
-
Tutorial
04 Jan 2012
IT in Europe, Security Edition: Password security standards and trends
Passwords have long been a security problem. This IT in Europe: Security Edition looks at password trends and alternative forms of authentication. Continue Reading
By- SearchSecurity.co.UK Staff
-
News
21 Dec 2011
ICO stands by unpopular UK cookie legislation with advice, warnings
Website owners have resisted compliance with cookie legislation so the ICO has issued more guidance and warnings to nudge them along. Continue Reading
By -
Tip
19 Dec 2011
Segregation of duties: Small business best practices
Segregating duties can be tough in organisations that have few staff members and resources. Get duty segregation best practices for SMBs. Continue Reading
By -
News
05 Dec 2011
Concerned about tablet security issues? Some are, others not so much
Users love their tablets, but security pros are concerned about tablet security issues. However, though tablets bring new threats, not everyone is ringing the alarm. Continue Reading
By -
Tip
25 Aug 2011
Map your data classification policy to controls effectively: How-to
Data classification policy plays an important role in control implementation and effectiveness. We take a look at the involved parameters. Continue Reading
By- Vishal Gupta
-
News
23 Aug 2011
Scholarships aim to encourage women to pursue cybersecurity careers
To boost the percentage of women in IT security careers, (ISC)2 has instituted two new scholarships, each totalling up to $40,000 per year. Continue Reading
By -
News
03 Aug 2011
Hotmail makes sign-in changes, can't please everyone
The Hotmail sign-in page is in the news this week, with subtle changes to browser auto-complete behaviour to provide wider browser compatibility. Continue Reading
By- Stephen Gillies, editor
-
News
22 Jun 2011
Security awareness tips: Making programmes more effective
Several information security pros, via LinkedIn, share their best security awareness tips with SearchSecurity.co.UK. Continue Reading
By -
News
29 Apr 2011
Store dealing with dishonest employees uses internal theft prevention software
A London-based sushi chain expects to save almost £1 million this year with the help of new fraud-detection software. Continue Reading
By -
News
30 Mar 2011
Two-factor authentication alternatives
Worried by the breach at RSA? Here are some two-factor authentication alternatives to consider. Continue Reading
By- Simon Sharwood
-
News
17 Feb 2011
Optus email rejects shortened URLs
Optus has adjusted its email security regime to repel incoming emails that use URLs shortened by services like bit.ly or TinyURL. Continue Reading
By- Simon Sharwood
-
Tip
05 Apr 2010
Using resource allocation management to prevent DoS and other attacks
Resource allocation management is an effective way to prevent denial-of-service (DoS) and other attacks. Find out how to allocate resources in order to increase the security of your organisation. Continue Reading
By -
Tip
05 May 2009
How to find credit card numbers and other sensitive data on your users' computers
If you worry that important and sensitive data like credit card numbers is lurking on your users' hard drives, read on to learn how to search for and corral this information. Continue Reading
By- Mike Chapple, University of Notre Dame
-
News
24 Dec 2008
Ian Yates' quite literal year in review
Ian Yates product reviews are unique and make ideal holiday reading. Continue Reading
By- Ian Yates
-
Tip
01 Oct 2008
How to manage Hyper-V's security permissions
Learn how to operate Hyper-V's Authorization Manager (Azman) in this How-To guide. Continue Reading
By -
News
27 Sep 2007
Pacific Hydro finds UTM improves its environment
Renewable energy company Pacific Hydro has found Watchguard's unified threat management devices make a valuable contribution to its defence in depth strategy. Continue Reading
By- Simon Sharwood
-
News
02 Sep 2007
Now the dust has settled on pornography filtering...
Andrew Collins looks at the controversial topic of Internet porn filtering in Australia, now that the federal government has enacted its hotly debated plans. Continue Reading
By- Andrew Collins
-
News
21 Aug 2007
Nigel Phair, author of 'Cybercrime: The Reality of the Threat', on Australia's response
In the first instalment of a three part interview, TechTarget Australia's Patrick Gray interviews Australian Federal Police Agent Nigel Phair about his new book: Cybercrime: The Reality of the Threat. Until recently, Phair was the Team Leader of Investigations at the Australian High Tech Crime Centre (AHTCC) in Canberra. Continue Reading
By- Patrick Gray
-
News
14 Aug 2007
Telstra network build spurs new security plan
Telstra's experience constructing the Next G and Next IP networks has seen the telco evolve a new security strategy. Continue Reading
By- Simon Sharwood
-
News
19 Nov 2006
Virtualisation: friend or foe? [Day Two: The virtual appliance]
Virtualisation slashes costs, makes management easier, unshackles software configurations from hardware. And it is being embraced around the world. But is it secure? In this three-part series, Patrick Gray explores the security implications of this important new technology. Continue Reading
By- Patrick Gray