Category Archives: IT Security, Risk & ESG
SaaS suppliers are no black box, evaluation is key
An aspect of cloud computing that is often overlooked is supplier evaluation and management. We[...]
SaaS security: it comes down to knowing what you are doing
A lot of things have happened recently that may cause us to think twice about[...]
SaaS providers – The good, the bad and the ugly
Interested in software as a service (SaaS) but worried about the risks to your information?[...]
Buying into the cloud
A lot of companies are reporting that individual departments and even business users are adopting[...]
Software as a service can breed dependency so choose suppliers with care
Cloud computing is frequently likened to utility services such as electricity, water or gas. If[...]
The weakest link in Software as a Service
The delivery of cloud based application functionality via the Software as a Service (SaaS) model[...]
Secure your departmental apps
Throughout a workshop on The Register, we’ve been looking at resiliency and security for hosted[...]
What you think about SaaS
Throughout a workshop conducted on The Register, we have been looking at the factors that[...]
Whose data is it anyway?
Losing control of one’s data is among the first concerns that arise when software as[...]
Putting the SaaS into security management
In all areas of business, security and privacy are built on good policy, properly applied.[...]
Is cloud data secure?
Would your data be more secure in the hands of Google or left where it[...]
A question of performance
Software as a service (SaaS) promises a lot but many are still nervous about relying[...]
Trust and risk in the cloud
Stick enough kit and multi-tenant software in one huge data centre and there is no[...]
What is the point of End Point Protection?
How we should be protecting our PCs Security threats have existed for almost as long[...]
The alternatives to password protection
In a world where it is possible to create credential-stealing malware and where users are[...]
The perception and reality of cloud security
Some back to front thinking in evidence? One of the most frequent concerns about cloud[...]
Modern solutions to an ever-growing challenge
What could be new about backup and recovery? After all, everyone has been doing it[...]
Disaster recovery blurs into high availability (or other way round?)
IT managers use two terms when talking about systems availability. These are: High Availability or[...]
Shaping your next desktop upgrade
The economic downturn caused many companies to delay their desktop and notebook refresh plans, but[...]
The industrialisation of the IT Threat Landscape
Business and IT are now changing with a rapidity never before seen while at the[...]
CIOs and ’Data Protection’
By Tony Lock The rapid growth in the amount of stored data means that the[...]
Data encryption adoption represents a significant opportunity
By Andrew Buss Data protection continues to be a top of mind subject for many[...]
Keys to data encryption adoption
Data protection remains top-of-mind for many companies. Data losses continue across both public and private[...]
The threat and promise of server virtualisation security
Given that IT security is all about understanding, and mitigating risks, it is inevitably going[...]