New forms of computer threats are emerging at a faster pace than ever before. There can be little doubt that security continues to be a major commercial, as well as a technical, concern. All the major security companies log thousands of new threats, including viruses and worms, every year.
As the number of security threats continues to spiral and the thirst for information from the business and supply chain partners continues to increase, companies are finding themselves caught between a rock and a hard place. The NCC provides valuable insight into the latest threats that will enable you to stay one step ahead.
From TechWeekEurope The UK government has announced 7.5 million funding for two Centres for Doctoral Training that it hopes will fill the skills gap damaging the nation's cyber security industry. The centres will be based in London's Royal Holloway and the University of Oxford. The Department of Business, Innovation and Skills (BIS) ... read more..
From ComputerWeekly.com IT consultancy Purple Frog Systems believes its gold certification to the IASME information assurance standard for small to medium enterprises gives it a competitive edge. Many of the firm's customers are large corporations looking for help in data warehousing, data mining and building business intelligence dashboards. But clients such as ... read more..
From IT Pro Cyber security company Clearswift has claimed the most serious threats to businesses' data comes from inside the organisation itself. The research found that 83% of organisations had experienced a data security incident of some form in the past year, whether by accident or through malicious activity. While external threats are, ... read more..
From CIO CIO at the hospital where Boston Marathon bombing patients and suspects have been treated since the April 15 blasts, Dr John Halamka, has shared the lessons learned from an IT and security management perspective. 'IT in general experiences more demands than supply,' Halamka said. 'Last week, we learned firsthand how ... read more..
From V3.co.uk Infosec Europe is always an interesting affair, drawing players big and small from the security community, government and wider industry to London's Earl's Court to talk security and issues affecting the sector. This year was as busy as ever, as the likes of security tycoon Eugene Kaspersky, Finnish white-hat Mikko ... read more..
From Computerworld.com Big data is all the buzz in board rooms these days, but in security circles it's a mixed blessing. The technology allows tons of threat data to be analysed and used to thwart intruders. In the enterprise, it can be used to analyse volumes of network traffic to reveal insider ... read more..
From ComputerWeekly.com Information security professional body (ISC)2 and the Cloud Security Alliance (CSA) have signed an agreement to collaborate on a new professional certification for information security. The initiative is aimed at addressing concern over the security of cloud-based services by establishing a common global understanding and best practices in design, implementation ... read more..
From Information Age Android remained the top target for mobile malware in 2012, with 95% of all infections discovered on the platform, NQ Mobile said in a statement last week. According to NQ, the number of malware attacks on Google's mobile platform more than doubled in the period from 2011 to 2012. ... read more..
From ComputerWeekly.com Data security in the cloud is still a top concern for UK companies, a survey of 250 IT decision makers has revealed. Exposure of confidential company and customer data is the top concern of half of respondents from a range of private and public sector organisations polled by managed services ... read more..
From Computerworld.com A British government security group said that it hasn't yet evaluated the security of BlackBerry 10 devices such as the Z10. The UK Communications-Electronics Security Group (CESG) statement was issued following a report last Tuesday in the Guardian newspaper that it had rejected the BB10 and its Balance software over ... read more..
From Information Management Today, IT managers and corporate management aren't just focused on big data, despite its overwhelming media coverage. In fact, when we discuss data security concerns with IT managers, there are three other factors getting as much of or even more of their attention: The consumerisation ... read more..
From InformationWeek The Government is introducing a new initiative to fight organised online crime: Cyber Crime Reduction Partnership (CCRP). The programme will provide a new forum in which UK law enforcement, the computer industry and academia can regularly come together to tackle cybercrime more effectively. Security Minister at the Home Office James ... read more..
From ComputerworldUK The Territorial Army (TA) is actively recruiting for IT security specialists as part of a live TV recruitment campaign from the front. The TA LIVE recruitment drive aims to demonstrate the opportunities available in the TA, and raise awareness of the army's current recruitment targets. 'As the army adapts to a ... read more..
From V3.co.uk Cyber security best practices are no longer enough to stop attacks, according to HP Security Research director of security intelligence John Pirc. Pirc said that the time has come for security professionals to get out of their comfort zone. He told the RSA conference 2013 the time has come to ... read more..
From TechRepublic Bring your own device (BYOD) will help to not only empower your employees; it will save your company's bottom line. Without having to purchase extra hardware, that budget will be freed up for other crucial elements of business. But along with BYOD comes a wealth of concerns one ... read more..
From IT Adviser The information security profession is defying recessionary economic conditions as those working in the field enjoy upward mobility, salary increases and full employment. That's according to the latest (ISC)2 Career Impact Survey, which we have conducted since 2008 to track the effect of the economic downturn on the ... read more..
From V3.co.uk Since the start of the year security issues have dominated the news agenda with numerous Java exploits being uncovered, hacks on major institutions being revealed and even the ICO issuing its largest ever fine of 250,000 against Sony. While law enforcement and tech giants like Microsoft are fighting back in ... read more..
From Computing.co.uk Adobe has been forced to investigate reports of a zero-day security flaw in its Reader and Acrobat software that leaves users vulnerable to cyber attacks. The exploit was discovered by researchers at network security firm FireEye, who suggest users avoid opening any PDF attachments from an unknown source until the ... read more..
From IT Adviser Companies across the UK are adopting a 'bring your own device' (BYOD) programme for a number of good reasons. Corporate management can save money on hardware and new handsets and focus on usage polices and packages for employees. Businesses can also take advantage of newer technology faster. Meanwhile, staff ... read more..
From ComputerWeekly.com The next generations of workers are increasing the security challenges facing CIOs because they are mobile and mix work and private lives throughout the day, according to Cisco research. Two reports from Cisco reveal the challenges facing businesses and individuals attempting to remain secure from cyber threats. 'Findings from two global ... read more..
Mobility Integration is a Major Challenge for ITOrganisations are moving beyond the traditional means of connecting with existing and potential customers. Similarly, they are exploring different avenues to fulfil the ever-increasing needs for reductions in the cost of IT, greater productivity and better employee engagement. As a result, in most ... read more..
Security Concerns for the Coming YearThe big security themes for 2012 were mobile device and application protection, lack of cloud-based security, data-loss prevention and the need for big data management. If advanced protection requirements and increasing compliance demands are added to the equation, most of these issues will continue to ... read more..
Media release In the wake of the Government's recent warning that cyber crime costs UK plc an estimated 21 billion every year, the UK's National Computing Centre (NCC) has launched a new security audit service priced at just 3,995 plus VAT. The National Computing Centre Information Security Audit is carried out by ... read more..
26 September 2012, Networking Seminar This briefing explores the real challenges of enterprise mobililty and flexibility, and shares flexible workplace best practices you can leverage to gain productivity and deliver cost efficiencies. Download the presentation slides Ian Jones, NCC Introduction Simon Gale, CTO, IBM Workplace ... read more..
The Landscape Around Open Data and Gov 2.0 Starts to Take Shapeidea of Gov 2.0 re-envisioning whats possible in government/citizen interaction and problem solving through the application of collaboration technologies has been around since 2004. Only very recently, however, has it reached the common lexicon, with local, state ... read more..
Apple Bids to Acquire AuthenTec and Bring Enhanced Security to iOSApple has made a bid to acquire AuthenTec, a mobile encryption and security specialist. This acquisition is notable not just because Apple finds it notoriously difficult to spend its growing cash pile, but also because AuthenTec inked a deal in ... read more..
Results of NCC Member's Question: Issued 20 June 2012 NCC Members can ask relevant questions of the wider NCC membership, moderated by NCC. We collate the responses, where appropriate anonymise them, then publish the results on the website for the benefit of the wider Membership. Can you help with this question ... read more..
17 July 2012, Networking Seminar This seminar explores emerging mobile technology trends, the catalysts behind them and the ways in which technology can help organisations strategically balance the opportunity and the risks. Download the presentation slides Ian Jones, NCC Tony Osborn, head of technology, public sector, ... read more..
COBIT 5: Helping Address Cultural ChallengesOvum believes that COBIT 5 offers valuable direction and tools on how the business and IT can better meet strategic objectives, while also addressing the cultural issues that are inherent with change initiatives and new implementations. The recently published fifth version of the COBIT framework ... read more..
NCC Members can ask relevant questions of the wider NCC membership, moderated by NCC. We collate the responses, where appropriate anonymise them, then publish the results on the website for the benefit of the wider Membership. Can you help with this question from a standards body? Is anyone deploying iPads at ... read more..