It's not easy to find IT staff with the right skill-set, and it's even harder to find people with good Cisco skills. That's according to Steve Capper, director of IT at construction firm Skanska, as he told Computing recently. Further ...
Tags: Cisco Skills, Harder Still, IT Staff
There is no cyber security skills gap, according to the head of business continuity and information security at The Economist, Vicki Gavin. A National Audit Office (NAO) report earlier this year said that it could take 20 years to address ...
Tags: Computer Products, software
The Bank of England has revealed that several of the UK's banks have been hit by cyber attacks in the last six months, which have led to the institutions making financial losses. In its Financial Stability Report, the bank said that the ...
Tags: Computer Products, software
Cyber attacks on container ships and port infrastructure will get more sophisticated as time goes on and companies should be doing more to protect their supply chain security. Maritime and IT security companies have raised their concerns ...
The adoption of iPads and iPhones by enterprise was predictable and Apple should have stolen a march on its competitors by creating its own mobile device management(MDM)software,according to law firm DWF's CTO,Richard Hodkinson. In an ...
Tags: mobile device management, MDM, Apple, CISO
Millions of mobile phone users across the European Union (EU) are set to benefit from fast-tracked reforms of telecoms regulation, which include an end to roaming charges. The 27 European Commissioners voted on Tuesday in Brussels to end ...
Tags: EU, Mobile Roaming Charges
Big data is not yet being embraced, according to Adrian Asher, chief information security officer (CISO) of the Skype division at Microsoft. Asher told delegates at Infosecurity Europe 2013 that big data is currently just a buzzword used ...
Tags: Big Data, Computer Products
Security experts speaking at Infosecurity Europe 2013 said that raising employees' awareness of cyber risks is a vital element of their incident response strategies, and urged firms to give staff incentives to learn security best practice. ...
Tags: Computer Products, software
Director of information services and security at Wolfson Microelectronics, Andrew Ralston, railed against cloud services providers on a panel at the Infosecurity Europe conference today. Further reading Wozniak: Cloud is going to be ...
A day after researchers hacked Chrome and Firefox at the Pwn2Own contest, Google and Mozilla patched their browsers Thursday. The contest also wound down yesterday after hackers had earned a record $480,000 over two days. The update to ...
Tags: Chrome, Firefox, Google Mozilla
Research teams Wednesday cracked Microsoft's Internet Explorer 10 (IE10), Google's Chrome and Mozilla's Firefox at the Pwn2Own hacking contest, pulling in more than $250,000 in prizes. Earlier in the day, a solo hacker exploited Oracle's ...
Tags: Microsoft, Oracle's Java, explorer
The pros and cons of BYOD were laid out in a panel discussion at Infosecurity 2013 yesterday, with the CISOs of Commerzbank, law firm Field Fisher Waterhouse (FFW) and National Rail all giving their views on one of the most talked about ...
Tags: BYOD, panel discussion, Infosecurity, IT industry
The chief information security officers (CISOs) of Network Rail, Commerzbank and law firm Field Fisher Waterhouse have slated bigger security software vendors for lagging behind smaller rivals in mobile security. In a panel discussion ...
Tags: Network Rail, Field Fisher Waterhouse, security software, mobile security
Egress Software Technologies have recently announced that they have signed up to exhibit at Infosecurity Europe from 23-25th April 2013, this will be the first time Egress will be exhibiting at the event. Infosecurity Europe is the number ...
Tags: Egress Software Technologies, Infosecurity Europe, 2013
An enduring disconnect between information management and infosecurity plagues corporate organizations,say data management experts. This has been a recurrent theme of SearchDataManagementUK interviews with people familiar with the state ...
Tags: data management, infosecurity