Security, IT Infrastructure and Business Continuity
Read lots more articles on security software, IT infrastructure & business continuity software on the UK’s No. 1 guide to software, services and technology – NCC's Evaluation Centre. Project help also available, so why not REGISTER NOW.
From TechWeekEurope The UK government has announced 7.5 million funding for two Centres for Doctoral Training that it hopes will fill the skills gap damaging the nation's cyber security industry. The centres will be based in London's Royal Holloway and the University of Oxford. The Department of Business, Innovation and Skills (BIS) ... read more..
From Techworld Hewlett-Packard is barely holding on to the top spot in the laptop and desktop market, but hopes a renewed vigour regarding product design will help reverse the fortunes of its PC business. The company is standardising the design and features in its laptops and tablets to help customers identify its ... read more..
From ComputerWeekly.com IT consultancy Purple Frog Systems believes its gold certification to the IASME information assurance standard for small to medium enterprises gives it a competitive edge. Many of the firm's customers are large corporations looking for help in data warehousing, data mining and building business intelligence dashboards. But clients such as ... read more..
From InformationWeek BlackBerry CEO Thorsten Heins recently offered a baffling perspective on the tablet market: he thinks it is a dead-end business. In fact, he sees tablets going away entirely before the end of the decade. 'In five years I don't think there'll be a reason to have a tablet anymore,' said ... read more..
From IT Pro Cyber security company Clearswift has claimed the most serious threats to businesses' data comes from inside the organisation itself. The research found that 83% of organisations had experienced a data security incident of some form in the past year, whether by accident or through malicious activity. While external threats are, ... read more..
From CIO CIO at the hospital where Boston Marathon bombing patients and suspects have been treated since the April 15 blasts, Dr John Halamka, has shared the lessons learned from an IT and security management perspective. 'IT in general experiences more demands than supply,' Halamka said. 'Last week, we learned firsthand how ... read more..
From V3.co.uk Infosec Europe is always an interesting affair, drawing players big and small from the security community, government and wider industry to London's Earl's Court to talk security and issues affecting the sector. This year was as busy as ever, as the likes of security tycoon Eugene Kaspersky, Finnish white-hat Mikko ... read more..
From Computerworld.com Big data is all the buzz in board rooms these days, but in security circles it's a mixed blessing. The technology allows tons of threat data to be analysed and used to thwart intruders. In the enterprise, it can be used to analyse volumes of network traffic to reveal insider ... read more..
From ComputerWeekly.com Information security professional body (ISC)2 and the Cloud Security Alliance (CSA) have signed an agreement to collaborate on a new professional certification for information security. The initiative is aimed at addressing concern over the security of cloud-based services by establishing a common global understanding and best practices in design, implementation ... read more..
From Information Age Android remained the top target for mobile malware in 2012, with 95% of all infections discovered on the platform, NQ Mobile said in a statement last week. According to NQ, the number of malware attacks on Google's mobile platform more than doubled in the period from 2011 to 2012. ... read more..
From Databarracks Infrastructure as a Service (IaaS) provider, Databarracks (www.databarracks.com), in association with the National Computing Centre (NCC), has launched the Guidelines for 'Disaster Recovery in the Cloud', aimed at providing practical advice on disaster recovery (DR) when using cloud services. As computing moves away from the onsite server room model to ... read more..
Media release Infrastructure as a Service (IaaS) provider, Databarracks (www.databarracks.com), in association with the National Computing Centre (NCC), has launched the Guidelines for 'Disaster Recovery in the Cloud', aimed at providing practical advice on disaster recovery (DR) when using cloud services. As computing moves away from the onsite server room model to ... read more..
From IT Adviser What springs to mind when people mention IT governance? All too often, we think 'bureaucracy'. We've all seen the decisions queued up for discussion at some governance committee, the endless round of compliance checks, the audits. We've read the thick policy manuals (or at least pretended to). We've ... read more..
From CIO Spending on risk management IT is expected to slow, as financial sector budgets remain low and organisations shift investments to new areas. A report from IDC Financial Insights has shown that expenditure on risk management software, hardware and services for 2013 to 2017 will increase at a slower rate than ... read more..
From ComputerWeekly.com Data security in the cloud is still a top concern for UK companies, a survey of 250 IT decision makers has revealed. Exposure of confidential company and customer data is the top concern of half of respondents from a range of private and public sector organisations polled by managed services ... read more..
From IT Adviser The double launch of Windows 8 and the new Microsoft Surface tablet demonstrate that BYOD (bring your own device) is here to stay. With technology providers rushing to increase the web, mobile and tablet offerings of their enterprise tools, BYOD represents a significant change to the business world, ... read more..
From Computerworld.com A British government security group said that it hasn't yet evaluated the security of BlackBerry 10 devices such as the Z10. The UK Communications-Electronics Security Group (CESG) statement was issued following a report last Tuesday in the Guardian newspaper that it had rejected the BB10 and its Balance software over ... read more..
From Information Management Today, IT managers and corporate management aren't just focused on big data, despite its overwhelming media coverage. In fact, when we discuss data security concerns with IT managers, there are three other factors getting as much of or even more of their attention: The consumerisation ... read more..
From InformationWeek The Government is introducing a new initiative to fight organised online crime: Cyber Crime Reduction Partnership (CCRP). The programme will provide a new forum in which UK law enforcement, the computer industry and academia can regularly come together to tackle cybercrime more effectively. Security Minister at the Home Office James ... read more..
From ComputerworldUK The Territorial Army (TA) is actively recruiting for IT security specialists as part of a live TV recruitment campaign from the front. The TA LIVE recruitment drive aims to demonstrate the opportunities available in the TA, and raise awareness of the army's current recruitment targets. 'As the army adapts to a ... read more..
From V3.co.uk Cyber security best practices are no longer enough to stop attacks, according to HP Security Research director of security intelligence John Pirc. Pirc said that the time has come for security professionals to get out of their comfort zone. He told the RSA conference 2013 the time has come to ... read more..
From TechRepublic Bring your own device (BYOD) will help to not only empower your employees; it will save your company's bottom line. Without having to purchase extra hardware, that budget will be freed up for other crucial elements of business. But along with BYOD comes a wealth of concerns one ... read more..
From IT Adviser The information security profession is defying recessionary economic conditions as those working in the field enjoy upward mobility, salary increases and full employment. That's according to the latest (ISC)2 Career Impact Survey, which we have conducted since 2008 to track the effect of the economic downturn on the ... read more..
From IT Pro Tech kit repair site iFixit has warned that the Microsoft Surface Pro tablet is even harder to repair than the notoriously difficult iPad. The site has given the Surface Pro a 'repairability' score of one out of ten, which suggests a broken device could be impossible to fix. The team ... read more..
From V3.co.uk Since the start of the year security issues have dominated the news agenda with numerous Java exploits being uncovered, hacks on major institutions being revealed and even the ICO issuing its largest ever fine of 250,000 against Sony. While law enforcement and tech giants like Microsoft are fighting back in ... read more..
From Computing.co.uk Adobe has been forced to investigate reports of a zero-day security flaw in its Reader and Acrobat software that leaves users vulnerable to cyber attacks. The exploit was discovered by researchers at network security firm FireEye, who suggest users avoid opening any PDF attachments from an unknown source until the ... read more..
From IT Adviser Companies across the UK are adopting a 'bring your own device' (BYOD) programme for a number of good reasons. Corporate management can save money on hardware and new handsets and focus on usage polices and packages for employees. Businesses can also take advantage of newer technology faster. Meanwhile, staff ... read more..
From ComputerWeekly.com The next generations of workers are increasing the security challenges facing CIOs because they are mobile and mix work and private lives throughout the day, according to Cisco research. Two reports from Cisco reveal the challenges facing businesses and individuals attempting to remain secure from cyber threats. 'Findings from two global ... read more..
Mobility Integration is a Major Challenge for ITOrganisations are moving beyond the traditional means of connecting with existing and potential customers. Similarly, they are exploring different avenues to fulfil the ever-increasing needs for reductions in the cost of IT, greater productivity and better employee engagement. As a result, in most ... read more..
VMware Spreads its Java Development Reach with vFabricThe crucial message to take away from the recent VMworld Europe 2012 conference in Barcelona is that VMware has software solutions for the broader management of virtualised environments that cover VMware vSphere and Microsoft Hyper-V. To use VMwares terminology for the new-generation virtualised ... read more..