Sopra Steria finds UK citizens want more secu... » London: Sopra Steria has revealed that UK citizens are keener than ever to use digital public servic... World’s top education experts to answer key q... » Education experts, Edtech entrepreneurs and an assortment of thinkers, analysts and administrators f... HAUD gives more value through its Traffic Audit ... » Singapore: HAUD has now established itself as a market leading SMS firewall provider, and through ex... 365squared launches 365analytics » Macau, China: 365squared introduced 365analytics to its portfolio of services. 365analytics is a rea... Checkpoint Systems deploys its EAS Solutions at ... » Checkpoint Systems has announced its partnership in implementing EAS pedestals and deactivation syst... Evander Direct wins commendation for uPVC window... » Evander Direct have been commended for their innovative uPVC cleaning process that dramatically help... Electrical Industries Charity to benefit from pr... » Thousands of pounds are set to be raised for good causes in the electrotechnical industry at the upc... Secure I.T. Environments achieves new internatio... » Data Centre World, London: Secure I.T. Environments Ltd has announced that it has achieved new inter... OKI upgrades wide format with new Teriostar Multif... » Egham: OKI Europe Ltd has launched two new wide format Teriostar multifunction printers designed to ... BSIA members push aggressively for cyber-security ... » BSIA members have pledged to lead the way in cyber-security education, Vigilance can report.

Our Guest Columnists

John Walker
Professor John Walker is the owner and MD of Secure-Bastion Ltd, a specialist Contracting/Consultancy in the arena of IT Security Research, Forensics, and Security Analytics. READ MORE >>


YORGEN EDHOLM
Yorgen Edholm is President and CEO of Accellion, a pioneer and leading provider of secure file transfer and collaboration solutions. READ MORE >>



Faitelson
Mr. Faitelson is responsible for leading the management, strategic direction and execution of the Varonis vision.
READ MORE >>

 


Mike Small

 

Mike Small has over 40 years experience in the IT industry. He is an honorary fellow analyst ....

READ MORE >>


Andy Cordial

Andy Cordial, managing director of secure storage systems specialist Origin Storage ...
READ MORE >>


Paul Steiner
Dr Paul Steiner joined Accellion in 2001 as Senior Vice President-Europe...
READ MORE >>


Durbin

Steve Durbin is Global Vice President of the Information Security Forum (ISF). He has served as an ...
READ MORE >>


David Gibson

David Gibson has been in the IT industry for more than fifteen years, with a breadth of experience in data governance, network management, network security, ..

READ MORE >>


Jane Grafton

Jane Grafton has more than twenty years experience in domestic and international sales, marketing and business development.

READ MORE >>


Mr Dimitriadis

Christos K. Dimitriadis, CISA, CISM, is the chief information security officer of INTRALOT S.A, a multinational supplier of integrated gaming and transaction processing systems based in Greece, ...

READ MORE >>


Philip Lieberman

Philip Lieberman, the founder and president of Lieberman Software, has more than 30 years of experience in the software industry.

READ MORE >>


Jon Mills

Jon Mills is the managing director and general manager of SEPATON for Europe, Middle East and Africa (EMEA).

READ MORE >>


Dr Rustom Kanga

Dr Rustom Kanga is co-founder and CEO of iOmniscient, one of the pioneers in the field of Video Analysis.

READ MORE >>

CLICK HERE TO

Although identified by Gartner as a top ten IT strategy for 2011, cloud technology has yet to realise its full potential in corporate IT departments - the promise of increased flexibility and scalability provided by the cloud is offset by ongoing concerns about the security of corporate data. So it is ironic that the cloud represents one of the most exciting and promising new channels for the development and use of anti-malware software.

  • Mind the Gap – bridging the security gap in Microsoft’s communication and collaboration platform to support secure file transfer

As the next wave of Microsoft products aim to define how people work, there is still one area in which SharePoint 2010, Outlook 2010 and OCS come up short - the ability to move files quickly and securely.   Microsoft SharePoint, Outlook and OCS products offer collaboration and communications functionality to business users, including basic file transfer.  However for today's businesses, this basic file transfer comes up short in size and security.  SharePoint limits file transfer between internal and external recipients, Outlook best practices limits file attachments to 10MB, and OCS provides no tracking or security for file transfers.

The Internet is a wonderful tool when it works, but we are increasingly at a loss when it encounters problems. Steve Durbin, Global VP at ISF (Information Security Forum) looks at what organisations should do to minimise the risks.

Server outages at global ISPs may be an extreme case, but they illustrate the challenge faced by businesses that are shifting a growing proportion of their information and transaction infrastructure online – often to cloud-based computing.

  • Many CISOs are caught by this logical paradox as, encouraged by the greed of their CEOs to cut costs, the increase in IT outsourcing starts to reveal its dark side

Not every outsourcing firm is bad news. It depends on who brought them up. It depends to a large extent on their parenting. Like The Dog Whisperer says: “There are no bad dogs – just bad owners.” This is a cautionary tale of a poor CISO driven witless by a ruthless, cost-cutting boss who falls foul of the worst traits of the mongrel outsourcing firm Offshore The Salvage IT Support company. Before I tell this sorry tale I want to say that not everyone is the same and there are exceptions to the rule. However, when you hear a story as many times as I have, you do start to generalise...

Whether you are a large retailer or a small internet boutique, if you accept credit cards you need to keep that information secure. It’s not just about compliance with The Payment Card Industry Data Security Standard (PCI DSS)— more importantly, you owe it to your customers. DAVID GIBSON, Director of Technical Services, Varonis Systems, takes us through the detail of PCI DSS compliance.

As enterprises struggle to remain profitable in an ever-changing risk environment, the current economic crisis has elevated the need for effective business risk management. Information security is a key parameter that affects business risk. The academic definition of information security is the “preservation of confidentiality, integrity and availability of information.”**  Confidentiality is the preservation of secrecy of information (e.g., business reports, technical designs or financial projections) by ensuring that viewing is conducted solely by authorized people. Integrity is ensuring that information is accurate and consistent and has not been manipulated. Availability ensures that information is accessible to authorized people when needed.

Despite the fact that since April 2010 a deliberate or malicious data breach can be punished with a fine of up to £500,000, organisations continue to leave themselves vulnerable to attack. A few weeks ago a doctor at North West London Hospitals NHS Trust was found to be in breach of the Data Protection Act for leaving medical information about 56 patients on the London Underground.

Many businesses know that tape is the dinosaur of business continuity solutions, but find the idea of replacing their legacy backup systems with disk arrays too intimidating. In this article, JON MILLS, Managing Director of SEPATON, dons his paleontologist’s hat, digs out his magnifying glass, and compares tape to Tyrannosaurus Rex to encourage anyone that doesn’t see the need to evolve their backup to reconsider their plans.

At first you may not think there are any similarities between Tyrannosaurus Rex and storage tapes: one is a carnivore that died out at the end of the Cretaceous period, the other is a magnetic medium for high capacity data storage. Yet the features of each mean that they face an evolutionary dead-end and replacement by nimbler, more adaptable, alternatives. Let’s look at some of the things they have in common:

Who can be our Guest Columnist?