Posts By Author:
A look at the approach to border controls, security, and systems in the UK ahead of the Olympics in London.
Without a holistic view of your information system, you invite failure that opens up your business and organization to security risks.
The mobile network has resulted in changes in how data flows and with it three significant vulnerabilities you need to address.
A recent Unisys Security Index shows the willingness by not just the young to use the digital world as a democratic tool. This raises a wider question as to whether we are doing enough to create the right avenues for people to easily express their objections to online crime rather than create their own “campaigns” of outrage.
Part 1 of this 3-part series addresses “The Increasing Value of Information” and the implications for IT security professionals.
The November 2011 Unisys Security Index revealed that almost half of respondents in the UK felt that the law enforcement authorities were playing catch up and needed more resources to monitor criminal behaviour online. This suggests that there is an increased expectation from the public about how law enforcement responds to cyber-security concerns and whether the authorities have access to the skills and resources they required. Based on our work with governments and businesses around the world, we feel there are three key areas which can help progress the debate.
In this ever connected world, the public want to know that they and their data are being protected. The conclusions from a Unisys Security Index survey show that the public expect law enforcement to have the legal framework to act swiftly to protect society online and that they, the People, are ready to act if they feel they have become a victim of data and online crime.
Opinion post from Neil Fisher that comments on undercover researcher Misha Glenny’s opinions from TED online conference re: understanding the hacker’s mindset.
Cyber criminals remain relatively free to cause disruption and alarm while stoking tensions across borders because of the lack of harmonisation of cyber law.
In military parlance, there are now considered five potential theatres for conflict – land, sea, air, outer space and now cyberspace. As with any area of Defence spending, investment and innovation in this fifth theatre are shrouded in secrecy. However, according to the Washington Post, the Pentagon has ratified a list of ‘approved cyber weapons’ [...]