Latest News

  • What are the important issues in IT security today? What are the solutions that work? You can get the opinions of some of the world’s leading IT security companies on these key points in the second issue of the Wick Hill Guardian, a thought leadership supplement, which is bound into the Q2 issue of Infosecurity magazine.
  • As the volume of data generated within the enterprise workflow grows bigger each and every day, adopting a future-proof approach to information security will be increasingly imperative – and even more challenging. Much talk has arisen about the cloud and mobile devices, and their requisite applications, being a growing threat vector. But new survey results suggest that when it comes to protecting companies’ IT infrastructure, it is in fact people who present the biggest security problem.
  • (ISC)² has announced the availability of its Certified Cyber Forensics Professional – European Union (CCFPSM-EU) certification.
  • In our Big Data era where the cloud, ubiquitous mobility and the all-digital economy form the hallmarks, information security has become ascendant. The area has almost certainly crossed the chasm from being seen as a necessary but niche IT function to something central to the viability of an organization. And with broader-ranging respect and a higher profile comes job satisfaction, apparently: new research has revealed that infosecurity professionals feel that there has never been a better time to work in the industry.
  • Police have to be prepared for any contingency, but when it comes to cybercrime in the UK, it turns out that the boys and girls in blue have some work to do. A report from her Majesty's Inspectorate of Constabulary (HMIC) has found only 2% of police staff across 37 forces in England and Wales had been trained to effectively investigate cybercrime.
view more

Trending Topic - #Heartbleed

Blogs

  • Posted by Ernst & Young LLP • 16 April 2014
    By Mark Brown Much has been made of Microsoft’s decision to stop security support for Windows XP over the last few weeks. Some commentators have likened it to something of a Y2K-esque tech apo...
    rated:
  • Posted by IRM Plc • 14 April 2014
    By Punam Tiwari On my return home from my Cheltenham Head Office one evening, I happened upon an opinon article quite randomly lying around in the train by David Aaronovitch of The Times, titled...
    rated:
  • Posted by Bob Tarzey • 21 March 2014
    It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for ...
    rated:
  • Posted by Drew Amorosi • 17 March 2014
    Nine months and counting – nine months since Edward Snowden first told the world that the US government logged the metadata of all telephone traffic. Shortly after came PRISM, involvement by the...
    rated:
view more

Features

view more
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×