Like it or not,the"bring your own device"(BYOD)trend is in full swing.According to Juniper Research,the number of employee-owned smartphones and tablets used in businesses will more than double by 2014,reaching 350 million compared with ...
Tags: Policy, BYOD, Smartphone, Tablet
Information security awareness needs to be company-wide, according to Julie Peeler, director of the (ISC)2 Foundation. "Organisations need to think beyond IT when planning IT security awareness training, and tackle it from the bottom up, ...
Tags: IT Security, Company-Wide, Julie Peeler, awareness training
When it comes to good government IT strategy, only collaboration will work in the long term, according to Hord Tipton, executive director of professional certification body (ISC)2. But after that, governments should stop trying to ...
The value of data to cyber criminals Plan for cyber attacks Defence in depth against cyber attack Comprehensive approach to APTs Stuxnet,Duqu,Flame,and Gauss have nothing to do with businesses that are not involved in finance and critical ...
Tags: cyber criminals, cyber attack, OTMS, IT security
Businesses need to understand the critical importance of secure software development in defending against hackers. "Businesses need to look at their reliance on software and consider the importance of secure development to their ...
Tags: software, secure software, Microsoft, Security Development Conference
Many senior executives are still failing to understand the level of international cyber threat to their organisations, says the Information Systems Security Association (ISSA), UK chapter. "The nature of the threat is well understood in ...
Tags: ISSA, senior executives, international cyber threat, Information Systems