Most Viewed (last 30 days)

With the growing emphasis on the need to protect sensitive data, encryption has become a focus of interest for organisations worldwide. Yet data encryption has long had its challenges in dep ...  

Unifying Data Encryption

An insightful study, packed full of useful, well-presented data on information security breaches covering a dataset of 855 confirmed security breaches accounting for a combined 174 mi ...  

2012 Data Breach Investigations Report

Tape backup has been the traditional method for routine backup and archival data storage. The decreasing price of hard disks however, has many businesses switching to disk backup or a combin ...  

Backup Solutions for SMBs: Tape vs. the Cloud

The delivery of cloud based application functionality via the Software as a Service (SaaS) model frequently sparks a vigorous debate on security-related concerns. It is common to he ...  

Trust and Security in the Cloud

Virtual private networks (VPNs) are the technologies most widely used by organisations today in the provision of remote access to their networks for employees, business partners and s ...  

The Essential Elements of Secure Remote Access… Without the Management Headaches

As use of the internet has grown, the web has also become more popular with scammers, identity thieves, and other cybercriminals. Threats to internet users have become widespread, and ...  

A Guide to Fundamental Web Site Security

IT departments are facing three big issues when it comes to protecting the data created and stored on the systems they manage. First, the value of the data is often ...  

A Value Proposition for IT Security

To stay secure in 2011 and beyond, it’s vital that we understand how threats worked in 2010.  This report identifies the threats, the way they work, and provides insight into t ...  

Security Threat Report 2011

This presentation was given at an Info Security Magazine webinar in Nov 2009. It looks at how web threats are evolving and what action can be taken.    

The Evolution of Web Threats - Are your colleagues putting your business at risk?

What is protective monitoring, anyway?   Protective monitoring has become important for many large organisations in the UK, as publi ...  

Protective Monitoring - An Introduction to GPG 13

This report is based on a research study based on 160 interviews with small and medium businesses across the United Kingdom, France and Germany The ...  

Enabling Rapid and Effective IT Recovery

With organisations being so dependent on the electronic capture, storage and retrieval of increasing amounts of information, how well are they coping with modern-day requirements? 

Managing Information Risk

Putting the pieces in place for effective security delivery    Much has been written about the existence of various threats, internal and exter ...  

The Impact of IT Security Attitudes

Today, most Internet users have heard about phishing or have already been affected by phishing to some extent. And while the term phishing has been discussed ...  

Join the Phishing Evolution - Online Fraud Report

Today, many organisations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their comp ...  

Why Application Security is Crucial… and What Companies are Doing About It

Manual approaches to managing technical change within an organisation often lead to chaotic situations, with different upgrade and patch levels being applied at servers and desktops ...  

Change Management-Minimising Business Interruptions

  A graphical presentation that will provide answers to the following questions:   ...  

IT Security in the Real World - A Value Proposition

How encryption can add value to your business With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many o ...  

Removing the Complexity from Information Protection

Small businesses acknowledge that enabling access to data for remote employees and users from external organisations is fundamental to ensuring the on-going efficiency of the processe ...  

The Data Sharing Paradox

PCI DSS is about preventing card payment information held by merchants, or other third parties, from being used fraudulently and all the consequential financial and ...  

How to take the Pain Out of the PCI Process

More related articles:

1 2