Two-thirds of public sector officials feel that security should play a bigger role in the government's Digital by Default reform agenda, according to research by McAfee. The research, conducted in association with specialist political ...
Tags: Computer Products, software
Degree-level apprenticeships in cyber security have been launched in the UK as part of an employer-backed "Cyber Academy". The Cyber Academy, which was launched by the National Skills Academy for IT and e-skills UK, will see employers ...
Tags: Computer Products
Minister of state for universities and science David Willetts has exclusively told Computing that the government is working to create different entry routes to the cyber security profession. In December last year, the government released ...
Tags: Computer Products, software
The government's "digital by default" agenda should be accompanied by one of "security by default" if public sector organisations are to truly protect themselves against cyber security threats and avoid a cyber security skills crisis. ...
Tags: Computer Products
Cyber security solutions provider Becrypt and military-specified laptop and tablet manufacturer Getac have joined forces to develop an Android tablet solution for military, defence and the government. The vendors claim that the solution ...
Tags: Computer Products, webservice
The Communications Electronics Security Group (CESG) has launched two new schemes to help organisations obtain the relevant expertise in the event that they are subjected to a cyber-attack. CESG, the information security arm of British ...
Tags: Computer Products, software
Nearly 75 percent of government IT budgets are staying flat or increasing, according to a survey by analysts at Gartner. This comes in opposition to a continuing drive, especially in the UK, to lower the cost of government IT contracts by ...
Some of the biggest technology, telecommunications and security firms will share cyber threat intelligence with the government to help increase the security of the defence supply chain, as part of a new government scheme. The scheme ...
Tags: Computer Products, software
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer. Citadel is a ...
Tags: Payza, Payment Platform, Computer Products
GS mark is accepted by the majority of customers the security of the European flag. GS certified product sales are usually higher priced and more popular. European CE requirements, 1997.1.1. From control "Low Voltage Directive ...
Tags: GS, Certification
TITUS, a leading provider of information security and data governance software, is pleased to be a Silver Sponsor at RSA Conference 2013, taking place from February 25 to March 1 at the Moscone Center in San Francisco. Be sure to stop ...
IBM has rolled out a tool it says can cull massive terabytes of data, including email — to help customers detect external attacks aimed at stealing sensitive information or insider threats that might reveal corporate secrets. The ...
The pros and cons of BYOD were laid out in a panel discussion at Infosecurity 2013 yesterday, with the CISOs of Commerzbank, law firm Field Fisher Waterhouse (FFW) and National Rail all giving their views on one of the most talked about ...
Tags: BYOD, panel discussion, Infosecurity, IT industry
CIO-Regardless of the security expertise and resources you apply to securing your assets,you are unlikely to achieve much unless you focus on the most vulnerable element of your organization:your employees. "Computers have become much ...
Tags: secure data, the human element
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber