Security B-Sides London announces its galaxy of sp... » Security B-Sides London, the event driven by the information security community, has confirmed its l... Russian Kubinka Tank Museum to restore Maus Super-... » Company to assist the museum in building a unique collection of military warfare exhibits Wargaming... ISACA donates $20,000 to help UNESCO build knowled... » London, UK: As part of its new corporate social responsibility (CSR) program, ISACA, a global associ... Army couples needed for relationship study » Participants hold the key to improved relationships after deployment DENVER: Judy Davis is an acti... Global Association ISACA reaches 45 years and 115,... » London, UK: In 1969, the first message was sent between computers via ARPANET, the precursor o... Datum Datacentres announces fast growing cloud and... » FARNBOROUGH: Datum Datacentres has announced the official launch of the Datum Cloud Hub, the co-loca... ANIMATRONIC MANNEQUIN TO TEST PROTECTIVE EQUIPMENT » The Ministry of Defence has invested £1.1m in a new state-of-the-art robotic mannequin that will tes... Options upgrades low latency route between Cartere... » New York: Options has announced that it has upgraded the route between the firm’s data center facili... Cloud World Forum examines security, privacy and r... » London: As the adoption of cloud computing continues to grow across the world, security, privacy and... U.S. Air Force selects Cubic for Moroccan P5 Air C... » Cubic Defense Systems, a subsidiary of Cubic Corporation has been awarded a contract valued at more ...

Our Guest Columnists

John Walker
Professor John Walker is the owner and MD of Secure-Bastion Ltd, a specialist Contracting/Consultancy in the arena of IT Security Research, Forensics, and Security Analytics. READ MORE >>


YORGEN EDHOLM
Yorgen Edholm is President and CEO of Accellion, a pioneer and leading provider of secure file transfer and collaboration solutions. READ MORE >>



Faitelson
Mr. Faitelson is responsible for leading the management, strategic direction and execution of the Varonis vision.
READ MORE >>

 


Mike Small

 

Mike Small has over 40 years experience in the IT industry. He is an honorary fellow analyst ....

READ MORE >>


Andy Cordial

Andy Cordial, managing director of secure storage systems specialist Origin Storage ...
READ MORE >>


Paul Steiner
Dr Paul Steiner joined Accellion in 2001 as Senior Vice President-Europe...
READ MORE >>


Durbin

Steve Durbin is Global Vice President of the Information Security Forum (ISF). He has served as an ...
READ MORE >>


David Gibson

David Gibson has been in the IT industry for more than fifteen years, with a breadth of experience in data governance, network management, network security, ..

READ MORE >>


Jane Grafton

Jane Grafton has more than twenty years experience in domestic and international sales, marketing and business development.

READ MORE >>


Mr Dimitriadis

Christos K. Dimitriadis, CISA, CISM, is the chief information security officer of INTRALOT S.A, a multinational supplier of integrated gaming and transaction processing systems based in Greece, ...

READ MORE >>


Philip Lieberman

Philip Lieberman, the founder and president of Lieberman Software, has more than 30 years of experience in the software industry.

READ MORE >>


Jon Mills

Jon Mills is the managing director and general manager of SEPATON for Europe, Middle East and Africa (EMEA).

READ MORE >>


Dr Rustom Kanga

Dr Rustom Kanga is co-founder and CEO of iOmniscient, one of the pioneers in the field of Video Analysis.

READ MORE >>

CLICK HERE TO

John Davies
Mr Davies who is one of our Guest Columnists this week examines the forthcoming Protection of Freedoms Act 2012 (which comes into force from 1st September 2013) that will directly affect the way in which school pupils' biometric data is authorised and stored. The article looks at what this could mean to the security industry and suggests ways in which any potential issues can be avoided.

philip_lieberman
P.L

It seems that stories of employees ‘going rogue’ are always in the press – but how can companies stop them before they make the headlines? Do you even know if you have a rogue employee? If you’re a large multi-national organisation, the laws of probability aren’t in your favour. Add to the mix a person who’s earning minimum wage, handling data that has a retail value on the black market and the temptation might, one day, just prove too much.

T.O
T.O

The number of annual security incidents caused by insider threats continues to increase.  In The CERT Guide to Insider Threats, Capelli et al writes, “Insider threats are an intriguing and complex problem. Some assert that they are the most significant threat faced by organizations today.” Disgruntled system administrators damage data and systems, skilled professionals steal intellectual property, and inferior employees use information to achieve political or financial objectives for their self-gain.  Any of these can constitute a critical national defense breach or breach of public trust.

In a number of cases, Internet-attached private systems are not always maintained in an up-to-date state and, as such, are vulnerable to exploitation by mischief-makers and, of course, their cybercriminal peers.

With summer in full swing, employees across the country are heading out on vacation; likely topping their list of items to pack, mobile devices such as iPads, iPhones, Androids and BlackBerries.

Varonis looks at the implications for organisations that get it wrongand gives advice on how to protect your information in a digital world.

What Happened?

On Sunday July 10th, 2011 the News of the World published it last edition.  This paper had been publishing for 168 years and was the top selling Sunday newspaper in the UK. The closure came following revelations of how the newspaper had allegedly obtained personal information using illegal methods such as phone hacking.  What does this teach us about privacy and information governance?

In this media alert, Mickey Boodaei, Trusteer's CEO on Trusteer  1 in 20 predicting Android mobiles and iPhones will be infected by financial malware and Trojans within the next 12 months and Androids security architecture is not currently up to the challenge.  The Alert covers Problems with Android phones and also iPhones/iPads:

Who can be our Guest Columnist?