A breach of trust for local authorities?

In August, privacy campaign group Big Brother Watch revealed that local authorities recorded 4,236 data breaches over a three year period. GT asks whether the data we submit is really secure?

Loss and theft of information from organisations continues to be a significant problem. Given the amount of attention to this problem and the wealth of standards and technology available, why do these leaks still occur and what can be done to improve matters? asks Mike Small, London Chapter of the ISACA Security Advisory Group

From applying security policies to DLP and effective user authentication, there are many IT security lessons to be learned from the classic space opera. Terry Greer-King, Check Point’s UK managing director shows how companies can avoid the Empire’s mistakes

Cyberthreats have come a long way in the last few years. Professor John Walker London Chapter ISACA Security Advisory Group and CTO of Secure-Bastion believes the days of external simplex threats have now given way to multi-faceted attack vectors from both outside and inside the average organisation.

Cybercrime reportedly costs the world an amazing $380 billion a year. Cyberattacks, security budgets and BYOD were all in the spotlight at InfoSecurity Europe this April, which demonstrated new ways to protect organisations and IT users from the threat.

Cyberthreats have come a long way in the last few years. Professor John Walker London Chapter ISACA Security Advisory Group and CTO of Secure-Bastion believes the days of external simplex threats have now given way to multi-faceted attack vectors from both outside and inside the average organisation.

Following more incidents of stolen laptops in the public sector, Mark Exley asks why this is becoming a common phenomenon and gives some tips on how to keep IT safe

Professor Jim Norton, president, BCS, The Chartered Institute for IT, gives us some home truths about cyber security

Des Ward, President , Cloud Security Alliance UK & Ireland, looks at how the concept of security as we know it is disappearing

What’s the value of your security investment in firewalls and VPNs if they can be circumvented by a shared, stolen or recycled password, asks Jason Hart, senior VP, CRYPTOCard Europe

Keeping confidential data secure is a key element of security, writes Russell Harris of the BSIA

Keeping confidential data out of the wrong hands is a key element of public sector security

Rob Newburn, security specialist for Trustmarque Solutions, advises on encryption projects

Dr Paul Dorey, Chairman of the Institute of Information Security Professionals, explores the reasons why some IT security risks remain unmanaged

Information security and data governance is not just about assessment and procurement of encryption technologies

Pages

Supplier Profiles

Awesome Apps

While 3D printing is becoming more widely used in general engineering the use of 3D printing in the medical and allied sectors such as dentistry has only just begun.