The U.S. and Cuba » The White House, Washington Yesterday, after more than 50 years, we began to change America's rela... Why is an integrated network health solution criti... » Networks have become a strategic business asset that glues together the data, the applications, and ... Nuix joins McAfee security Innovation Alliance P... » LONDON, UK: Nuix has joined the McAfee Security Innovation Alliance program. Nuix and McAfee are now... IGEL updates Windows Embedded firmware and expands... » Reading, UK: IGEL Technology has updated its firmware for its Windows Embedded Standard 7 thin clien... ForgeRock reveals 2015 technology predictions » Bristol: ForgeRock Inc. has revealed its 2015 technology predictions. The company expects to see inc... Lancope unveils newly enhanced, world-Class cust... » Company has increased its investment in customer success by 150 percent this year LONDON UK: Lanco... ANNUAL ARMED FORCES COVENANT REPORT PUBLISHED » THE Armed Forces Covenant Annual Report has been presented to Parliament today and details the progr... Opengear Continues EMEA Momentum » Slough UK:  Opengear has announced its most impressive year in EMEA with across the board growth. 2... America and Boko Haram: Challenges and Responses ... » IN PRAISE OF SELF-RELIANCE Obama's America...not a friend in need, hence not a friend inde... Military training set to be improved with trees » Soldiers using Catterick Training Area (CTA) are set to benefit from improved facilities thanks to t...

Our Guest Columnists

John Walker
Professor John Walker is the owner and MD of Secure-Bastion Ltd, a specialist Contracting/Consultancy in the arena of IT Security Research, Forensics, and Security Analytics. READ MORE >>


YORGEN EDHOLM
Yorgen Edholm is President and CEO of Accellion, a pioneer and leading provider of secure file transfer and collaboration solutions. READ MORE >>



Faitelson
Mr. Faitelson is responsible for leading the management, strategic direction and execution of the Varonis vision.
READ MORE >>

 


Mike Small

 

Mike Small has over 40 years experience in the IT industry. He is an honorary fellow analyst ....

READ MORE >>


Andy Cordial

Andy Cordial, managing director of secure storage systems specialist Origin Storage ...
READ MORE >>


Paul Steiner
Dr Paul Steiner joined Accellion in 2001 as Senior Vice President-Europe...
READ MORE >>


Durbin

Steve Durbin is Global Vice President of the Information Security Forum (ISF). He has served as an ...
READ MORE >>


David Gibson

David Gibson has been in the IT industry for more than fifteen years, with a breadth of experience in data governance, network management, network security, ..

READ MORE >>


Jane Grafton

Jane Grafton has more than twenty years experience in domestic and international sales, marketing and business development.

READ MORE >>


Mr Dimitriadis

Christos K. Dimitriadis, CISA, CISM, is the chief information security officer of INTRALOT S.A, a multinational supplier of integrated gaming and transaction processing systems based in Greece, ...

READ MORE >>


Philip Lieberman

Philip Lieberman, the founder and president of Lieberman Software, has more than 30 years of experience in the software industry.

READ MORE >>


Jon Mills

Jon Mills is the managing director and general manager of SEPATON for Europe, Middle East and Africa (EMEA).

READ MORE >>


Dr Rustom Kanga

Dr Rustom Kanga is co-founder and CEO of iOmniscient, one of the pioneers in the field of Video Analysis.

READ MORE >>

CLICK HERE TO

Peter Webster
Peter Webster


Neglecting the general appearance of a building and its surroundings can attract vandals, leading to an increase in crime and antisocial behaviour that can easily spiral out of control. Corps Security’s CEO, Peter Webster, explains the principles behind broken window theory and suggests ways that facilities managers can avoid their premises becoming a target for criminal activity.

 

John Davies
Mr Davies who is one of our Guest Columnists this week examines the forthcoming Protection of Freedoms Act 2012 (which comes into force from 1st September 2013) that will directly affect the way in which school pupils' biometric data is authorised and stored. The article looks at what this could mean to the security industry and suggests ways in which any potential issues can be avoided.

philip_lieberman
P.L

It seems that stories of employees ‘going rogue’ are always in the press – but how can companies stop them before they make the headlines? Do you even know if you have a rogue employee? If you’re a large multi-national organisation, the laws of probability aren’t in your favour. Add to the mix a person who’s earning minimum wage, handling data that has a retail value on the black market and the temptation might, one day, just prove too much.

T.O
T.O

The number of annual security incidents caused by insider threats continues to increase.  In The CERT Guide to Insider Threats, Capelli et al writes, “Insider threats are an intriguing and complex problem. Some assert that they are the most significant threat faced by organizations today.” Disgruntled system administrators damage data and systems, skilled professionals steal intellectual property, and inferior employees use information to achieve political or financial objectives for their self-gain.  Any of these can constitute a critical national defense breach or breach of public trust.

In a number of cases, Internet-attached private systems are not always maintained in an up-to-date state and, as such, are vulnerable to exploitation by mischief-makers and, of course, their cybercriminal peers.

With summer in full swing, employees across the country are heading out on vacation; likely topping their list of items to pack, mobile devices such as iPads, iPhones, Androids and BlackBerries.

Varonis looks at the implications for organisations that get it wrongand gives advice on how to protect your information in a digital world.

What Happened?

On Sunday July 10th, 2011 the News of the World published it last edition.  This paper had been publishing for 168 years and was the top selling Sunday newspaper in the UK. The closure came following revelations of how the newspaper had allegedly obtained personal information using illegal methods such as phone hacking.  What does this teach us about privacy and information governance?

Who can be our Guest Columnist?