Most Viewed (last 30 days)

With the growing emphasis on the need to protect sensitive data, encryption has become a focus of interest for organisations worldwide. Yet data encryption has long had its challenges in dep ...  

Unifying Data Encryption

Tape backup has been the traditional method for routine backup and archival data storage. The decreasing price of hard disks however, has many businesses switching to disk backup or a combin ...  

Backup Solutions for SMBs: Tape vs. the Cloud

Virtual private networks (VPNs) are the technologies most widely used by organisations today in the provision of remote access to their networks for employees, business partners and s ...  

The Essential Elements of Secure Remote Access… Without the Management Headaches

An insightful study, packed full of useful, well-presented data on information security breaches covering a dataset of 855 confirmed security breaches accounting for a combined 174 mi ...  

2012 Data Breach Investigations Report

The delivery of cloud based application functionality via the Software as a Service (SaaS) model frequently sparks a vigorous debate on security-related concerns. It is common to he ...  

Trust and Security in the Cloud

To stay secure in 2011 and beyond, it’s vital that we understand how threats worked in 2010.  This report identifies the threats, the way they work, and provides insight into t ...  

Security Threat Report 2011

As use of the internet has grown, the web has also become more popular with scammers, identity thieves, and other cybercriminals. Threats to internet users have become widespread, and ...  

A Guide to Fundamental Web Site Security

This report is based on a research study based on 160 interviews with small and medium businesses across the United Kingdom, France and Germany The ...  

Enabling Rapid and Effective IT Recovery

What is protective monitoring, anyway?   Protective monitoring has become important for many large organisations in the UK, as publi ...  

Protective Monitoring - An Introduction to GPG 13

Putting the pieces in place for effective security delivery    Much has been written about the existence of various threats, internal and exter ...  

The Impact of IT Security Attitudes

In a nutshell: Email, a business critical application for smaller businesses needs the protection its status demands   Key ...  

Email resiliency and the SMB

The modern business is highly dependent on IT. When systems go down, the disruption can be widely felt, and even lead to tangible damage to the business or its brand. Against this b ...  

Risk and Resilience

IT departments are facing three big issues when it comes to protecting the data created and stored on the systems they manage. First, the value of the data is often ...  

A Value Proposition for IT Security

This presentation was given at an Info Security Magazine webinar in Nov 2009. It looks at how web threats are evolving and what action can be taken.    

The Evolution of Web Threats - Are your colleagues putting your business at risk?

How encryption can add value to your business With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many o ...  

Removing the Complexity from Information Protection

This research is for those who are interested in finding out more about achieving reliable data protection with a maximum of cost efficiency. The research is independently a ...  

Data Protection Basics

PCI DSS is about preventing card payment information held by merchants, or other third parties, from being used fraudulently and all the consequential financial and ...  

How to take the Pain Out of the PCI Process

Companies have to remain competitive, but the recent years of prosperity have made this less of a driving need in many industries. Most organisations think they can outperform their riv ...  

A Short Guide to Running Secure and Resilient Data Centres for Mid-Sized Businesses

Today, many organisations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their comp ...  

Why Application Security is Crucial… and What Companies are Doing About It

  A graphical presentation that will provide answers to the following questions:   ...  

IT Security in the Real World - A Value Proposition

More related articles:

1 2