NEW RAF INTELLIGENCE AIRCRAFT ARRIVES IN UK SEVE... » As part of its Airseeker Programme, the second signals intelligence aircraft has been delivered to t... Tenkay invests six figure sum for the future » Tenkay has installed a new state-of-the-art M20 component handling machine that is expected to incre... Stop Warmongering to preserve a Fraudulent Constit... » Email: Sundoor999@gmail.com Introduction In September 2013, as public clamor intensified for a Sov... Tripwire announces Asset Discovery Solution » London, UK: Tripwire, Inc.announced the debut of Tripwire® Asset Discovery Appliances, a high-perfor... HP unveils data-centric security protection enhanc... » New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration,... Tripwire announces asset discovery solution » PORTLAND, Ore.: Tripwire, Inc., has announced the debut of Tripwire® Asset Discovery Appliances, a h... Master Locksmiths Association joins powered gate... » The Master Locksmiths Association (MLA), the UK's leading trade association for the locksmith indust... Collyer Bristow is Deploying Enterprise Resource P... » LONDON, U.K LexisNexis® Enterprise has announced that Collyer Bristow LLP, a London-based law firm s... gateprotect listed in the Magic Quadrant for UTM F... » Hamburg: gateprotect, a German IT security specialist within the Rohde & Schwarz company group, was ... Duo to raise money for Blesma as part of Deloitte’... » Mark Powell, 42, and Matthew Toye, 43, will be cycling nearly 1000 miles from Land’s End to John O’G...

Our Guest Columnists

John Walker
Professor John Walker is the owner and MD of Secure-Bastion Ltd, a specialist Contracting/Consultancy in the arena of IT Security Research, Forensics, and Security Analytics. READ MORE >>


YORGEN EDHOLM
Yorgen Edholm is President and CEO of Accellion, a pioneer and leading provider of secure file transfer and collaboration solutions. READ MORE >>



Faitelson
Mr. Faitelson is responsible for leading the management, strategic direction and execution of the Varonis vision.
READ MORE >>

 


Mike Small

 

Mike Small has over 40 years experience in the IT industry. He is an honorary fellow analyst ....

READ MORE >>


Andy Cordial

Andy Cordial, managing director of secure storage systems specialist Origin Storage ...
READ MORE >>


Paul Steiner
Dr Paul Steiner joined Accellion in 2001 as Senior Vice President-Europe...
READ MORE >>


Durbin

Steve Durbin is Global Vice President of the Information Security Forum (ISF). He has served as an ...
READ MORE >>


David Gibson

David Gibson has been in the IT industry for more than fifteen years, with a breadth of experience in data governance, network management, network security, ..

READ MORE >>


Jane Grafton

Jane Grafton has more than twenty years experience in domestic and international sales, marketing and business development.

READ MORE >>


Mr Dimitriadis

Christos K. Dimitriadis, CISA, CISM, is the chief information security officer of INTRALOT S.A, a multinational supplier of integrated gaming and transaction processing systems based in Greece, ...

READ MORE >>


Philip Lieberman

Philip Lieberman, the founder and president of Lieberman Software, has more than 30 years of experience in the software industry.

READ MORE >>


Jon Mills

Jon Mills is the managing director and general manager of SEPATON for Europe, Middle East and Africa (EMEA).

READ MORE >>


Dr Rustom Kanga

Dr Rustom Kanga is co-founder and CEO of iOmniscient, one of the pioneers in the field of Video Analysis.

READ MORE >>

CLICK HERE TO

Martin Ruks
Martin Ruks

On the anniversary of this infamous crime, we ask - how would it be investigated if it happened in 2015?

52 years ago, on a quiet piece of track somewhere in Buckinghamshire, a Royal mail train was held up by a gang of 15 men, robbing it of the large quantity of cash it was hauling to London. After a successful raid, they made off with £2.6 million (equivalent £50m today) and although most of the gang were eventually arrested and imprisoned, it required one of the largest criminal investigations in UK history. As such, we’ve decided to have a look at how the robbers may have been caught by electronic or computer based evidence if it had been attempted in 2015.

MB
MB

Team effort: Working with third-party partners to achieve effective PCI-DSS compliance

Matthew Bryars, CEO of Aeriandi discusses the benefits and challenges of working with a third-party service provider to achieve regulatory compliance, and how to ensure any partnership is a successful one.

 

GB
GB

The impact of recent cyber attacks will be felt for years to come, perhaps having risen to a new level of hurt with the Target and Sony attacks. With a Fortune 500 CEO ousted and a Hollywood movie held hostage, cyber-security is on the minds of chief executives and board members as they gather in their first meetings of 2015. How can a massive organization with complex systems and networks prevent itself from becoming the next Target or Sony? Is there any hope?

 

DL
DL

Military personnel in Latin America, Africa and Asia practice group Transcendental Meditation to help protect their nations

Peter Webster
Peter Webster


Neglecting the general appearance of a building and its surroundings can attract vandals, leading to an increase in crime and antisocial behaviour that can easily spiral out of control. Corps Security’s CEO, Peter Webster, explains the principles behind broken window theory and suggests ways that facilities managers can avoid their premises becoming a target for criminal activity.

 

John Davies
Mr Davies who is one of our Guest Columnists this week examines the forthcoming Protection of Freedoms Act 2012 (which comes into force from 1st September 2013) that will directly affect the way in which school pupils' biometric data is authorised and stored. The article looks at what this could mean to the security industry and suggests ways in which any potential issues can be avoided.

philip_lieberman
P.L

It seems that stories of employees ‘going rogue’ are always in the press – but how can companies stop them before they make the headlines? Do you even know if you have a rogue employee? If you’re a large multi-national organisation, the laws of probability aren’t in your favour. Add to the mix a person who’s earning minimum wage, handling data that has a retail value on the black market and the temptation might, one day, just prove too much.

T.O
T.O

The number of annual security incidents caused by insider threats continues to increase.  In The CERT Guide to Insider Threats, Capelli et al writes, “Insider threats are an intriguing and complex problem. Some assert that they are the most significant threat faced by organizations today.” Disgruntled system administrators damage data and systems, skilled professionals steal intellectual property, and inferior employees use information to achieve political or financial objectives for their self-gain.  Any of these can constitute a critical national defense breach or breach of public trust.

Who can be our Guest Columnist?