Contagion: Collaborating to Fight the Malware Pandemic
By Terry Greer-King, Managing Director UK of Check Point How the IT security industry could learn from the medical profession to limit the spread of malware outbreaks. “A characteristic feature of...
View ArticleCentralised versus decentralised internet access: weighing up the security costs
By David L.H Ross, BT Assure, Global Sales Enablement & Partnerships When talking about the security implications of centralised versus decentralised internet access, it’s important to take into...
View ArticleThe Internet as a collective sub-conscious
By Dr Robert Ghanea-Hercock, Chief Researcher, BT Security Research Practice We are the Borg. We lost the war before it began. It can rightly be claimed that we are already homo-technus, the next stage...
View ArticleT’was the week before Christmas, and all through the house…
By Martin Brown, General Manager, Security Technology and Strategy
View ArticleThree time-tested security lessons for the modern enterprise
By Aaron Berman, CA SiteMinder Strategic Advisor and Evangelist. With the consumerization and BYOD revolutions well underway, it’s time to move on from the “if” and concentrate on the “how.” The new...
View ArticleRisk, reward and Big Data at CACS 2014
By Jason L. Stradley, US&C Security Practice Lead, BT Big Data. It’s not often we talk about it now without adding the word ‘analysis’ to the end of it. In a nutshell, it means making use of the...
View ArticleConnected Cars: driving you round the bend?
The ‘Internet of Things’ is one of those new phrases that, for most people, means a future of infinite possibilities. For us security professionals, our panic, doubt and quickened pulse trump any...
View ArticleContagion: Collaborating to Fight the Malware Pandemic
By Terry Greer-King, Managing Director UK of Check Point How the IT security industry could learn from the medical profession to limit the spread of malware outbreaks. “A characteristic feature of...
View ArticleCentralised versus decentralised internet access: weighing up the security costs
By David L.H Ross, BT Assure, Global Sales Enablement & Partnerships When talking about the security implications of centralised versus decentralised internet access, it’s important to take into...
View ArticleThe Internet as a collective sub-conscious
By Dr Robert Ghanea-Hercock, Chief Researcher, BT Security Research Practice We are the Borg. We lost the war before it began. It can rightly be claimed that we are already homo-technus, the next stage...
View ArticleT’was the week before Christmas, and all through the house…
By Martin Brown, General Manager, Security Technology and Strategy
View ArticleThree time-tested security lessons for the modern enterprise
By Aaron Berman, CA SiteMinder Strategic Advisor and Evangelist. With the consumerization and BYOD revolutions well underway, it’s time to move on from the “if” and concentrate on the “how.” The new...
View ArticleRisk, reward and Big Data at CACS 2014
By Jason L. Stradley, US&C Security Practice Lead, BT Big Data. It’s not often we talk about it now without adding the word ‘analysis’ to the end of it. In a nutshell, it means making use of the...
View ArticleConnected Cars: driving you round the bend?
The ‘Internet of Things’ is one of those new phrases that, for most people, means a future of infinite possibilities. For us security professionals, our panic, doubt and quickened pulse trump any...
View Article