Paul Bischoff explains that companies should educate their employees on the importance of Facebook privacy and other data-gathering apps that can potentially compromise both personal and company security.
Russian government moves to implement partial ban on foreign technology which is seen as a threat to national security.
IT security policies must evolve to embrace sensible policies for bring-your-own-device (BYOD), says Chris Mayers.
Alex Vovk explains how to leverage security policy and ensure it's performing correctly to prevent a data breach.
The return of a decade-old attack vector, the malicious macro, requires a granular, policy-based approach to managing email at the gateway, says Greg Sim.
A well-defined security programme focused around the company's most critical data, combining technology and education powered by metrics, will help businesses reduce insider risk levels says Neil Thacker.
Russia says it is revising its policies to help prevent information warfare, identity-theft and cyber-fraud.
News that Russia and China are set to sign a cyber-security treaty next month have left Western cyber experts unsure whether it is a threat or a promising development.
Having comprehensive cyber risk policies that are not followed can be as detrimental as not having a policy at all says Peter Given.Good who advises that good risk-insurance will demand appropriate procedures are both in place and implemented.
Nato cyber defence policy to declare that a cyber attack on any one member country is an attack on them all.
It's not enough to protect your own network, you also have to be prepared to cope with third party negligence, says Brian Foster.
Dame Margaret Beckett has criticised the government's National Security Strategy and says that the next version must do more to protect businesses from cyber threats.
There's issues around the big data emitted by driverless cars, security issues related to control of the cars, but it's the 'governance framework' that needs to be put in place first suggests Raimund Genes.
The rise in casual and contract workers has been accompanied by a rise in employee fraud leading Ching Liu to suggest that this temporary solution could create a permanent problem for many businesses.
"Privileged user management is central to enforcing security policies" says Bob Tarzey, analyst at Quocirca.
Context-aware security can make intelligent decisions while allowing mobile users to get the job done.
Businesses can accept employee device promiscuity without causing difficulties for IT management, says Centrify's Darren Gross.
Many more personal mobile devices will arrive in the office after Chrismas, so sort out your security policies now advises Leon Ward.
Enterprise mobility adoption is on the upswing in the UK and Europe, but serious concerns linger on security and privacy.
Only 27 per cent of organisations surveyed globally have well-defined network BYOD policies in place according to new research from Dimension Data.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Information Security Risk Manager, £45-55k + bens
Infosec People - West Midlands, England, Coventry
SOC Analyst, Aldershot, £55-63k + benefits
Infosec People - England, Aldershot, Hampshire
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Sign up to our newsletters
SC Magazine UK Articles
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Met Police grab suspect with phone unlocked to get hold of data
- Cyber-security must reflect risk not just regulation
- Data centres are on the move - where will they end up?
- Same fate befalls Post Office broadband as hit DT?
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Former Expedia IT employee admits to hacking execs from the inside
- Cyber-insurance: What will you be able to claim for and is it worth it?
- Levelling the playing field against targeted attacks
- India Supreme Court calls on tech giants to curb sexual assault, cyber-crime
- IoTSF conference: EU should become de facto regulator