Features

Identity and Access Management

A Risk Management-based Look at the Infosec Skills Gap A Risk Management-based Look at the Infosec Skills Gap

The (ISC)² US Government Advisory Board Executive Writers Bureau explores a broader perspective of the skills gap challenge and addresses why a wide range of knowledge and skill – from junior technical levels to senior management – is needed to adequately meet the demands
22 January 2013

Comment: Audit what’s Going on in your IT Infrastructure…It’s Not Rocket Science Comment: Audit what’s Going on in your IT Infrastructure…It’s Not Rocket Science

Aidan Simister of NetWrix looks at what organizations need to audit, but too often don’t
15 January 2013

Higher Learning: Information Security on Campus Higher Learning: Information Security on Campus

Danny Bradbury goes back to school and discovers that educational institutions face a unique set of security challenges
03 January 2013

Interview: News International’s Amar Singh Interview: News International’s Amar Singh

Amar Singh, CISO at News International, met Eleanor Dallaway in Miami, Florida, and explained how to handle a data breach, how to win buy-in from the board, and why CISOs need more respect…
20 December 2012

Comment: Mobile Devices Get Means for Tamper-evident Forensic Auditing Comment: Mobile Devices Get Means for Tamper-evident Forensic Auditing

Providing early evidence of tampering can shorten investigation times for breaches and audits, says Michelle Drolet of Towerwall
30 November 2012

How Secure Are Contactless Payments? How Secure Are Contactless Payments?

Does wireless necessarily equate to insecure in the world of payment transactions? Davey Winder examines the fears, and the realities
20 November 2012

Responding to a Data Breach Responding to a Data Breach

So, you’ve already figured out that your organization is the victim of a data breach. Conrad Constantine explains what your next steps should be
13 November 2012

Comment: Mobile Device Security – What’s Coming Next? Comment: Mobile Device Security – What’s Coming Next?

James Lyne from Sophos believes that the mobile device revolution is quite possibly the most significant change in computing since the shift from the mainframe more than 20 years ago
07 November 2012

Comment: Keeping VPNs Clean in the Era of Global Mobile Anarchy Comment: Keeping VPNs Clean in the Era of Global Mobile Anarchy

IT managers need to avoid mobile anarchy while providing reliable, secure mobile access. It’s proving a challenge to strike the right balance without affecting performance and upsetting the workforce, observes Dell SonicWALL’s Andrew Walker-Brown
31 October 2012

Government's Role in Information Security: Involvement = Global Priority Government's Role in Information Security: Involvement = Global Priority

Hord Tipton believes government has a significant role in developing and enforcing information security standards
24 October 2012

Showing 61 - 70 of 177 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×