SC Magazine June/July 2009
As people lobby to take iPhones and laptops into work, should business embrace or ban consumer technology? By Andrew Donoghue
Identity and access management (IAM) is at the heart of corporate security, a difficult task with potential for great savings. By Mark Mayne
An Eli Lilly loyalist for almost 30 years and one of the world's most important CISOs, he still has a lively feel for innovation. By ...
Polygraphs and speech analysis are not the solution - you need a range of techniques to trap corporate liars
Cloud service customers remain responsible for securing the hosts that perform the computation work
Cross-fertilisation between the techie and the businessperson has never been more necessary than today. An (ISC)2 whitepaper helps set out the debate