SURVEY: 1 IN 2 BUYERS REQUIRE CSR IN PROCUREM... » Almost half of buyer documents (48 per cent) seen by electrotechnical businesses with turnover above... G4S Africa supports small business development thr... » The latest product in the G4S Deposita range is a smart safe system called mini-pay that holds up to... Commissioner's statement following incident in Man... » This is an utterly appalling attack. My thoughts are with the people of Manchester as they try to co... UPDATE: Policing events in the Capital » Following the horrific terrorist attack in Manchester last night, in which 22 people were killed and... Statement from Assistant Commissioner » Statement from Assistant Commissioner Mark Rowley, Head of National Counter Terrorism Policing: The... Met intensifies policing activities in London fol... » The Metropolitan Police Service (MPS) has increased police numbers and operations across the Capital... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTORA... » Please visit also: www.scorpionnewscorp.com SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW A treat... Home Secretary’s statement on the Manchester attac... » I know that some people will only just be waking up to the news of the horrific attacks in Mancheste... Checkpoint Systems unveils Bug Tag 2 loss preventi... » Checkpoint Systems has announced the launch of Bug Tag 2 – an innovative loss prevention solution th... Edesix launches new head and torso mounted body wo... » Edesix has announced the launch of new head and torso mounted cameras. The X-100 is a side-mounta...

Our Guest Columnists

John Walker
Professor John Walker is the owner and MD of Secure-Bastion Ltd, a specialist Contracting/Consultancy in the arena of IT Security Research, Forensics, and Security Analytics. READ MORE >>


YORGEN EDHOLM
Yorgen Edholm is President and CEO of Accellion, a pioneer and leading provider of secure file transfer and collaboration solutions. READ MORE >>



Faitelson
Mr. Faitelson is responsible for leading the management, strategic direction and execution of the Varonis vision.
READ MORE >>

 


Mike Small

 

Mike Small has over 40 years experience in the IT industry. He is an honorary fellow analyst ....

READ MORE >>


Andy Cordial

Andy Cordial, managing director of secure storage systems specialist Origin Storage ...
READ MORE >>


Paul Steiner
Dr Paul Steiner joined Accellion in 2001 as Senior Vice President-Europe...
READ MORE >>


Durbin

Steve Durbin is Global Vice President of the Information Security Forum (ISF). He has served as an ...
READ MORE >>


David Gibson

David Gibson has been in the IT industry for more than fifteen years, with a breadth of experience in data governance, network management, network security, ..

READ MORE >>


Jane Grafton

Jane Grafton has more than twenty years experience in domestic and international sales, marketing and business development.

READ MORE >>


Mr Dimitriadis

Christos K. Dimitriadis, CISA, CISM, is the chief information security officer of INTRALOT S.A, a multinational supplier of integrated gaming and transaction processing systems based in Greece, ...

READ MORE >>


Philip Lieberman

Philip Lieberman, the founder and president of Lieberman Software, has more than 30 years of experience in the software industry.

READ MORE >>


Jon Mills

Jon Mills is the managing director and general manager of SEPATON for Europe, Middle East and Africa (EMEA).

READ MORE >>


Dr Rustom Kanga

Dr Rustom Kanga is co-founder and CEO of iOmniscient, one of the pioneers in the field of Video Analysis.

READ MORE >>

CLICK HERE TO

SOCIAL BOOKMARK

Although identified by Gartner as a top ten IT strategy for 2011, cloud technology has yet to realise its full potential in corporate IT departments - the promise of increased flexibility and scalability provided by the cloud is offset by ongoing concerns about the security of corporate data. So it is ironic that the cloud represents one of the most exciting and promising new channels for the development and use of anti-malware software.

  • Mind the Gap – bridging the security gap in Microsoft’s communication and collaboration platform to support secure file transfer

As the next wave of Microsoft products aim to define how people work, there is still one area in which SharePoint 2010, Outlook 2010 and OCS come up short - the ability to move files quickly and securely.   Microsoft SharePoint, Outlook and OCS products offer collaboration and communications functionality to business users, including basic file transfer.  However for today's businesses, this basic file transfer comes up short in size and security.  SharePoint limits file transfer between internal and external recipients, Outlook best practices limits file attachments to 10MB, and OCS provides no tracking or security for file transfers.

The Internet is a wonderful tool when it works, but we are increasingly at a loss when it encounters problems. Steve Durbin, Global VP at ISF (Information Security Forum) looks at what organisations should do to minimise the risks.

Server outages at global ISPs may be an extreme case, but they illustrate the challenge faced by businesses that are shifting a growing proportion of their information and transaction infrastructure online – often to cloud-based computing.

  • Many CISOs are caught by this logical paradox as, encouraged by the greed of their CEOs to cut costs, the increase in IT outsourcing starts to reveal its dark side

Not every outsourcing firm is bad news. It depends on who brought them up. It depends to a large extent on their parenting. Like The Dog Whisperer says: “There are no bad dogs – just bad owners.” This is a cautionary tale of a poor CISO driven witless by a ruthless, cost-cutting boss who falls foul of the worst traits of the mongrel outsourcing firm Offshore The Salvage IT Support company. Before I tell this sorry tale I want to say that not everyone is the same and there are exceptions to the rule. However, when you hear a story as many times as I have, you do start to generalise...

Whether you are a large retailer or a small internet boutique, if you accept credit cards you need to keep that information secure. It’s not just about compliance with The Payment Card Industry Data Security Standard (PCI DSS)— more importantly, you owe it to your customers. DAVID GIBSON, Director of Technical Services, Varonis Systems, takes us through the detail of PCI DSS compliance.

As enterprises struggle to remain profitable in an ever-changing risk environment, the current economic crisis has elevated the need for effective business risk management. Information security is a key parameter that affects business risk. The academic definition of information security is the “preservation of confidentiality, integrity and availability of information.”**  Confidentiality is the preservation of secrecy of information (e.g., business reports, technical designs or financial projections) by ensuring that viewing is conducted solely by authorized people. Integrity is ensuring that information is accurate and consistent and has not been manipulated. Availability ensures that information is accessible to authorized people when needed.

Despite the fact that since April 2010 a deliberate or malicious data breach can be punished with a fine of up to £500,000, organisations continue to leave themselves vulnerable to attack. A few weeks ago a doctor at North West London Hospitals NHS Trust was found to be in breach of the Data Protection Act for leaving medical information about 56 patients on the London Underground.

Many businesses know that tape is the dinosaur of business continuity solutions, but find the idea of replacing their legacy backup systems with disk arrays too intimidating. In this article, JON MILLS, Managing Director of SEPATON, dons his paleontologist’s hat, digs out his magnifying glass, and compares tape to Tyrannosaurus Rex to encourage anyone that doesn’t see the need to evolve their backup to reconsider their plans.

At first you may not think there are any similarities between Tyrannosaurus Rex and storage tapes: one is a carnivore that died out at the end of the Cretaceous period, the other is a magnetic medium for high capacity data storage. Yet the features of each mean that they face an evolutionary dead-end and replacement by nimbler, more adaptable, alternatives. Let’s look at some of the things they have in common:

Who can be our Guest Columnist?