Compliance Regulation and Standard Requirements, Data Breach Incident Management and Recovery, IT Security Frameworks and Standards, IT Security Jobs, Careers and Certification Training, Information Security Risk Assessment: Methodology and Analysis, Security Policies and User Awareness
Data Protection Solutions and Strategy, Database Security Tools and Techniques, Email and Instant Messaging Security, Enterprise Data Storage, Platform and OS Security Management, Secure Coding and Application Programming, Security for Cloud Computing and Hosted Services, Virtualisation Technology Solutions and Strategy, Web Application Security
Endpoint and NAC Protection, Network Security Monitoring: Tools and Systems, Threat and Vulnerability Management, Virtual Private Network Security, Wireless Network Security: Setup, Issues and Threats
PwC’s cybercrime awareness report revealed who is most likely to commit cybercrime, and who is the best choice to respond in any organisation.
SearchNetworkingUK Briefs provides a summary of the week’s new product, services and appointment announcements. This week includes mobile management and much more.
Some question the path to network convergence - is it through FCoE or iSCSI? Either way, preparing the existing infrastructure will be key to a healthy network environment.
Many network managers may have an emotional resistance to cloud computing, but experts explain the economic benefits and positive career impact outsourcing data centre resources can have.
This month's IT in Europe examines the views of the experts on the new EU framework, and assess what it means for European IT managers.
Download Technology Priorities for 2012
This month's IT in Europe examines how you can prepare for the new EU data regulations.
Roundtable discussion on business value of big data, chaired by Brian McKenna, Editor, SearchDataManagementUK, and featuring Mike Ferguson, Roxane Edjlali (Gartner), Joshua LeCure (GlaxoSmithKline).
Find out where to hone your business intelligence, data management and data warehouse skills with this list of training courses for 2012.
Poor data quality can have serious financial consequences for businesses. Read about the current state of data quality management at UK companies, including dirty data problems.
The Dark Web is where many shady deals can happen on the Internet, but Tor vulnerabilities have made it too risky for one of the largest online black markets to stay in business.
News roundup: As Internet of Things concerns become an enterprise reality, one vendor is quick to offer IoT services to combat the risks. Plus: 1% of users create 75% of the risk; Target pays up; Apple devices improperly secured in the enterprise.
Video: SearchSecurity spoke with Tenable co-founder Ron Gula about recent additions to the Nessus feature set, including a version that lives in the cloud.
Amazon Web Services added support for key aliases to help improve enterprise cloud encryption key management. Learn what key aliases are and the benefits they bring to the enterprise.
Using passwords to authenticate users has a long and troubled past. Expert Rob Shapland explains how open standards such as FIDO, SAML and OpenID can help solve the woes surrounding user authentication in the cloud.
While backup as a service sounds like a great idea, there are several considerations to keep in mind prior to jumping in feet first. Expert Dan Sullivan explains.
India is moving towards a digital future with dreams of smart cities, but Indian IT companies seem to be unconscious to the need for data security
Chinese mobile phone maker Xiaom is to set up a datacenter in India to allay fears over data security raised by the Indian Air Force (IAF).
Detecting fake websites needs to be part of all companies' security strategies, according to security and domain name experts.