Assessing the security of the devices entering the CIO's domain

There appears to be room for a "big three" at the top of the smartphone tree at the moment.The operating systems that appear to have solidified...

Redefining BYOD

More companies are seeing the benefits of allowing their employees to bring personally owned devices into the workplace and onto the corporate...

The Buck stops where?

Should software vendors be liable for vulnerabilities in the products they sell?  Are they already liable to some degree, or would new...

Angels & Demons: The CISO & the CIO

While the importance of the Chief Information Security Officer has been in constant growth over the past six years, organisations that employ a...

DigiNotar, where did our trust go?

The story that recently caused the biggest stir in IT security and government circles was the compromise at Dutch certificate authority DigiNotar...

Consumerisation is not just a buzzword

Consumerisation is a word I am hearing a lot these days and yet as I type this I realise that it is still a word in its infancy, even my word...

Trust is not in the bind, it is in the bond

In the fight against online crime, banks and other financial institutions have steadily been rolling out new technologies to counter the threat...

The future of Enterprise security

The increase in workforce mobility, the adoption of virtualisation and cloud computing and the growing acceptance of "Bring Your Own Device" in...

Thoughts on the ENISA Governmental Clouds Report

A report released this month by the European Network and Information Security Agency (ENISA) has investigated the utility and applicability of...

0 day... 0 problem?

Zero-day attacks generate a lot of coverage and consequently occupy the security thinking of many Information Security professionals when planning...

Kicking bot and taking names

There has been much coverage recently of the enforcement activities undertaken by the Dutch High Tech Crime Unit in the Netherlands against 143...

Embed or Empower?

Now, I don't want to mention any names, but a recent proposed acquisition in the security space has really opened up the debate about the "proper...

Who holds the keys?

I was approached recently by a journalist from The Independent newspaper, to comment on the remarks made by Eric Schmidt from Google. Mr Schmidt...

Security in the brave new world

VDI, or desktop virtualisation has been "the next big thing" for several years now. The term was coined back in 2005 and pundits have regularly...

Security is not a bolt-on afterthought

I was recently fortunate enough to be invited to present at a conference in Tel Aviv. The title of the conference was "Powering the Cloud"; all...

Email encryption must be prioritised

When discussing the security of e-mail an often used analogy is "e-mail is like sending a postcard" and I would add "written in pencil'. Everyone...

Cloud /klaƱd/ -v. tr. to obscure

Businesses and political parties alike have spoken of the need to adopt cloud-based technologies and to make greater use of open source in a bid...

Malice in Wonderland

Despite best efforts by enterprises and security vendors; recent news stories and the prevailing opinion of executives I talk with both indicate a...

Social networking is coming, so plan your policies

Enterprise social networking can take many forms, in-house wikis, blogging platforms, podcasts, vodcasts or full blown social networking...

What's the problem with DLP?

2008 was the year that major security vendors were in acquisitive mood for Data Leakage Prevention technologies. All expectations were that 2009...

Load More