Cloud Computing: A Crowded Standards Landscape
There's growing demand for standards to bring clarity to the cloud computing market. Both buyers and sellers have their reasons to want common ways to do things such as transfer data from one cloud-based app or infrastructure to another. But the competition to be in control is fierce. This article will look at the increasingly crowded cloud computing standards landscape.
The Generation X, Y, Z of Information Security
The different ways in which information security is regarded and practiced by generations X, Y and Z is extreme. As we prepare for generation Z to start entering the workforce, we must consider how this will affect information security. Privacy and accessibility expectations in younger generations are vastly different than before. This article will look at the perceived technical needs of younger staff and how their expectations and attitudes affect information security.
Data Privacy, Protection and Law: Preparing for the EU General Data Protection Regulation
The vote to ratify the new EU data protection legislation is expected to take place in October with a view to being implemented by May 2014. With organizations facing potentially huge financial penalties and legal sanctions in the event of non-compliance and with some business sectors facing mandatory breach disclosures, the regulation will have far reaching consequences for data security, setting new parameters for compliance.
The BYOD phenomenon continues to cause information security managers headaches and loss of data. This article will offer an update on the BYOD threat landscape and investigate whether privacy and data security are sacrificed in exchange for convenience and cost saving.
Securing the ‘Internet of Things’
As more physical devices are connected to the internet, security implications are vast. From SMART grids to medical devices and cars, the proliferation of connected devices introduces increased cyber security risks. This article will take a look at the risk of breach, and the data security and compliance considerations as businesses look to harness the huge quantities of personal data from multiple devices.
Manipulating Financial Markets: The Next Wave in Cybercrime?
Scott Borg, the man who foresaw a Stuxnet-style cyber-attack years before it was discovered, has issued his latest prediction: manipulation of financial markets will be the long-term cybercrime wave of the future. This article will explore this prediction and ask the opinion of industry experts.