Compliance Regulation and Standard Requirements, Data Breach Incident Management and Recovery, IT Security Frameworks and Standards, IT Security Jobs, Careers and Certification Training, Information Security Risk Assessment: Methodology and Analysis, Security Policies and User Awareness
Data Protection Solutions and Strategy, Database Security Tools and Techniques, Email and Instant Messaging Security, Enterprise Data Storage, Platform and OS Security Management, Secure Coding and Application Programming, Security for Cloud Computing and Hosted Services, Virtualisation Technology Solutions and Strategy, Web Application Security
Endpoint and NAC Protection, Network Security Monitoring: Tools and Systems, Threat and Vulnerability Management, Virtual Private Network Security, Wireless Network Security: Setup, Issues and Threats
SearchNetworkingUK Briefs provides a summary of the week’s new product, services and appointment announcements. This week includes mobile management and much more.
Some question the path to network convergence - is it through FCoE or iSCSI? Either way, preparing the existing infrastructure will be key to a healthy network environment.
Many network managers may have an emotional resistance to cloud computing, but experts explain the economic benefits and positive career impact outsourcing data centre resources can have.
This month's IT in Europe examines the views of the experts on the new EU framework, and assess what it means for European IT managers.
Download Technology Priorities for 2012
This month's IT in Europe examines how you can prepare for the new EU data regulations.
Roundtable discussion on business value of big data, chaired by Brian McKenna, Editor, SearchDataManagementUK, and featuring Mike Ferguson, Roxane Edjlali (Gartner), Joshua LeCure (GlaxoSmithKline).
Find out where to hone your business intelligence, data management and data warehouse skills with this list of training courses for 2012.
Poor data quality can have serious financial consequences for businesses. Read about the current state of data quality management at UK companies, including dirty data problems.
Expert Nick Lewis details how the Tilon malware strain utilizes a unique communication protocol with its C&C infrastructure.
Expert Nick Lewis explains the logic behind the 'Bouncer' attack toolkit and its seemingly contradictory use of whitelisting security methods.
Increasingly sophisticated malware can divert the attention of IT departments from low-level security gaps. Here’s why you need a strategy that works on all levels.
Expert Dave Shackleford explains how new cloud firewall management and automation tools can be harnessed to better monitor systems and enact rules.
Until a common cloud provider assessment paradigm is agreed upon, experts say enterprises will be left wanting on cloud data security validation.
Is the cloud more or less secure than your current environment? How to assess your risk before moving data processing or applications to the cloud.
Vulnerabilities in government of India websites could wreak havoc in Asia’s second fastest growing economy as expert warns that Indian is less protected than regional neighbors
Organizations require Chief Information Security Officers (CISOs) to be much more than just a technical expert but also possess business skills in today’s growing technology driven Indian market
Apple patched a critical iOS SSL flaw Friday that allows attackers to manipulate SSL/TLS data. The flaw exists in OS X too and has yet to be fixed.