January 2016 Issue of SCMagazine UK

January 2016 Issue of SCMagazine UK

Data now resides on multiple devices, in many locations. Is it out of control?; Most companies are not ready or able to comply with the proposed new Data Protection Regulations; Cloud adoption is growing at a tremendous pace, along with a subsequent expansion of the threat landscape. Should we be worried?

Winter 2016 digital edition

Products: Industry Innovators

Industry Innovators: Access Control

The approaches to access control have varied over the decades, but today the challenges are greater than ever.

Industry Innovators: Perimeter Defence

The perimeter is disappearing

Industry Innovators: Data Protection

There would be no need for security on our networks if we didn't care about protecting the data that sit on them and travel on ...

Product Opener

Thank you to the bad guys

These tools address the rash of large-scale attacks and can fend off those to come, says Peter Stephenson, technology editor.

Update

Movers & Makers: Winter 2016

Recent updates on the people and organisations that make up the information security industry

2 Minutes On: Safe Harbour ruled invalid

The data-sharing agreement known as Safe Harbour was ruled invalid on 6 October by the Court of Justice of the European Union, with widespread ramifications ...

Features

Do your data policies stand up to scrutiny?

Most companies are not ready or able to comply with the proposed new Data Protection Regulations, reports Roi Perez, while ignoring them is not an ...

Silver linings while clouds gather

There's no denying that cloud adoption is growing at a tremendous pace, along with a subsequent expansion of the threat landscape. Keeping mountains of data ...

Predictions: 2016 and beyond

Industry predictions for cyber-security are unlikely to achieve a consensus, but they do provide plenty of insights and recurring themes that serve as indicators of ...

Securing data wherever it may be

Data now resides on multiple devices in many locations. But, Kate O'Flaherty asks, is it out of control?

Opinion

Last Word: A CISO checklist

Understanding how a breach impacts your business is crucial to deciding how to respond explains Andrew Nanson, CTO cyber at CORVID