The Devil is in the Data - Infographic » Irish image and data auditing company PixAlert have released an infographic highlighting the signifi... Wargaming Brings its Naval MMO to gamescom 2014 » Wargaming has announced its presence at gamescom 2014, the world's largest trade fair for interactiv... Barracuda Backup achieves VMware Ready status » Basingstoke: Barracuda Networks, Inc. has announced that Barracuda Backup has achieved VMware Ready™... Valuing the Police Report » Her Majesty's Inspectorate of Constabulary (HMIC) has rated the Metropolitan Police Service (MPS) as... Fonix Mobile selects Alert Logic to extend its s... » London: London-based SMS messaging and mobile payment billing company Fonix Mobile has chosen Alert ... Attenda positioned for Cloud-enabled managed hosti... » London: Attenda Limited today has been positioned by Gartner Inc., in the Challengers quadrant of th... Downing of Malaysian jet: UN calls on parties t... » [The UN Security Council holds a moment of silence in honour of the victims of crashed flight MH17. ... How foreign security firms are treating Nigerians ... » ...With introduction by JOHN ODEY ADUMA, EDITOR AND BRITISH CHEVENING SCHOLAR The Presi... Bill Butler happy with key survey findings » Boss of the SIA Executive Bill Butler welcomes the key findings of the recently published IFSEC Glob... Mighty Mitie is over £3.75 million richer as it... » Mitie was recently awarded three contracts in its award-winning painting business. Combined, the thr...

Our Guest Columnists

John Walker
Professor John Walker is the owner and MD of Secure-Bastion Ltd, a specialist Contracting/Consultancy in the arena of IT Security Research, Forensics, and Security Analytics. READ MORE >>


YORGEN EDHOLM
Yorgen Edholm is President and CEO of Accellion, a pioneer and leading provider of secure file transfer and collaboration solutions. READ MORE >>



Faitelson
Mr. Faitelson is responsible for leading the management, strategic direction and execution of the Varonis vision.
READ MORE >>

 


Mike Small

 

Mike Small has over 40 years experience in the IT industry. He is an honorary fellow analyst ....

READ MORE >>


Andy Cordial

Andy Cordial, managing director of secure storage systems specialist Origin Storage ...
READ MORE >>


Paul Steiner
Dr Paul Steiner joined Accellion in 2001 as Senior Vice President-Europe...
READ MORE >>


Durbin

Steve Durbin is Global Vice President of the Information Security Forum (ISF). He has served as an ...
READ MORE >>


David Gibson

David Gibson has been in the IT industry for more than fifteen years, with a breadth of experience in data governance, network management, network security, ..

READ MORE >>


Jane Grafton

Jane Grafton has more than twenty years experience in domestic and international sales, marketing and business development.

READ MORE >>


Mr Dimitriadis

Christos K. Dimitriadis, CISA, CISM, is the chief information security officer of INTRALOT S.A, a multinational supplier of integrated gaming and transaction processing systems based in Greece, ...

READ MORE >>


Philip Lieberman

Philip Lieberman, the founder and president of Lieberman Software, has more than 30 years of experience in the software industry.

READ MORE >>


Jon Mills

Jon Mills is the managing director and general manager of SEPATON for Europe, Middle East and Africa (EMEA).

READ MORE >>


Dr Rustom Kanga

Dr Rustom Kanga is co-founder and CEO of iOmniscient, one of the pioneers in the field of Video Analysis.

READ MORE >>

CLICK HERE TO

John Davies
Mr Davies who is one of our Guest Columnists this week examines the forthcoming Protection of Freedoms Act 2012 (which comes into force from 1st September 2013) that will directly affect the way in which school pupils' biometric data is authorised and stored. The article looks at what this could mean to the security industry and suggests ways in which any potential issues can be avoided.

philip_lieberman
P.L

It seems that stories of employees ‘going rogue’ are always in the press – but how can companies stop them before they make the headlines? Do you even know if you have a rogue employee? If you’re a large multi-national organisation, the laws of probability aren’t in your favour. Add to the mix a person who’s earning minimum wage, handling data that has a retail value on the black market and the temptation might, one day, just prove too much.

T.O
T.O

The number of annual security incidents caused by insider threats continues to increase.  In The CERT Guide to Insider Threats, Capelli et al writes, “Insider threats are an intriguing and complex problem. Some assert that they are the most significant threat faced by organizations today.” Disgruntled system administrators damage data and systems, skilled professionals steal intellectual property, and inferior employees use information to achieve political or financial objectives for their self-gain.  Any of these can constitute a critical national defense breach or breach of public trust.

In a number of cases, Internet-attached private systems are not always maintained in an up-to-date state and, as such, are vulnerable to exploitation by mischief-makers and, of course, their cybercriminal peers.

With summer in full swing, employees across the country are heading out on vacation; likely topping their list of items to pack, mobile devices such as iPads, iPhones, Androids and BlackBerries.

Varonis looks at the implications for organisations that get it wrongand gives advice on how to protect your information in a digital world.

What Happened?

On Sunday July 10th, 2011 the News of the World published it last edition.  This paper had been publishing for 168 years and was the top selling Sunday newspaper in the UK. The closure came following revelations of how the newspaper had allegedly obtained personal information using illegal methods such as phone hacking.  What does this teach us about privacy and information governance?

In this media alert, Mickey Boodaei, Trusteer's CEO on Trusteer  1 in 20 predicting Android mobiles and iPhones will be infected by financial malware and Trojans within the next 12 months and Androids security architecture is not currently up to the challenge.  The Alert covers Problems with Android phones and also iPhones/iPads:

Who can be our Guest Columnist?