Category Archives: IT Security, Risk & ESG

Mobile technology and security

By Josie Sephton In a nutshell: The issue of security when thinking about flexible working[...]

Threat or opportunity?

By Martin Atherton In a nutshell: When it comes to data protection and information security[...]

Driving With the Brakes On

By Jon Collins In a nutshell: While much attention around information risk is on medium[...]

Security – policies, processes and people

The problem with building foolproof systems, so the saying goes, is that the world seems[...]

Does business really care about security?

I once read a book that said, among other things, “You can never truly give[...]

Delivering on data governance – Making sure IT’s glass is half full

Data governance can be dismissed as ‘applied common sense’, or balked at as an impossible[...]

Should we be encrypting backups?

We all know that data protection regulations are gaining teeth. As we discussed before, it[...]

Is it possible to measure IT Security?

It is a commonly held principle in many areas of business that if you can’t[...]

Delivering a secure information infrastructure

I recently had the task of writing an explanatory paper about Good Practice Guide (GPG)[...]

Protective Monitoring

by Jon Collins and Martin Atherton MAIN POINTS CESG (Communications and Electronic Security Group) Good[...]

The impact of virtualisation on securing systems

Virtualisation has become an established trend in the x86 server market and is moving into[...]

Using systems management tools in IT security

Every IT professional recognises the importance of securing the IT systems that are now at[...]

The evolving role of the IT security manager

Security has long been the poor cousin of IT. As any security professional knows, the[...]

Securing Your Network

In this three part podcast Jason Stamper, editor at CBR, talks to Jon Collins and[...]

Data security strategies and drivers

Audience – Sales and pre-sales audience selling to large enterprises and government Occasion – Annual[...]

Security: Get the board on board

While the principles of IT security are relatively timeless and straightforward to understand, technology itself[...]

Rethinking security. Just what are you trying to secure?

Ask any IT manager, business leader or regulator and they will tell you that IT[...]

Application Retirement: What about the Data?

by Jon Collins and Martin Atherton Introducing application retirement: what’s really important to you? Whatever[...]

Should all hard drives be encrypted?

Given the origins of computing in the coding and decoding of messages, it’s fair to[...]

Securing the Un-securable?

Audience – IT security practitioners and academics Occasion – BCS Information Security Special Interest Group[...]

Dedication to regulation

By Martin Atherton Regulation is a fact of life and business. The signs are that[...]

Virtualisation and Security

As x86 / x64 server virtualisation moves into everyday operations, what impact does it have[...]

Data protection and identity management – are you sure you’re safe?

Data protection is an essential area for businesses, and an increasingly critical one to deal[...]

Is your data safe – and accessible?

Data protection has been a requirement and an obligation for organisations of all sizes since[...]