Compliance Regulation and Standard Requirements, Data Breach Incident Management and Recovery, IT Security Frameworks and Standards, IT Security Jobs, Careers and Certification Training, Information Security Risk Assessment: Methodology and Analysis, Security Policies and User Awareness
Data Protection Solutions and Strategy, Database Security Tools and Techniques, Email and Instant Messaging Security, Enterprise Data Storage, Platform and OS Security Management, Secure Coding and Application Programming, Security for Cloud Computing and Hosted Services, Virtualisation Technology Solutions and Strategy, Web Application Security
Endpoint and NAC Protection, Network Security Monitoring: Tools and Systems, Threat and Vulnerability Management, Virtual Private Network Security, Wireless Network Security: Setup, Issues and Threats
Recent surveys from a variety of research firms and vendors revealed key trends in Web application vulnerabilities, cloud computing concerns and the motivations behind attacks. Here we highlight the key findings.
SearchNetworkingUK Briefs provides a summary of the week’s new product, services and appointment announcements. This week includes mobile management and much more.
Some question the path to network convergence - is it through FCoE or iSCSI? Either way, preparing the existing infrastructure will be key to a healthy network environment.
Many network managers may have an emotional resistance to cloud computing, but experts explain the economic benefits and positive career impact outsourcing data centre resources can have.
This month's IT in Europe examines the views of the experts on the new EU framework, and assess what it means for European IT managers.
Download Technology Priorities for 2012
This month's IT in Europe examines how you can prepare for the new EU data regulations.
Roundtable discussion on business value of big data, chaired by Brian McKenna, Editor, SearchDataManagementUK, and featuring Mike Ferguson, Roxane Edjlali (Gartner), Joshua LeCure (GlaxoSmithKline).
Find out where to hone your business intelligence, data management and data warehouse skills with this list of training courses for 2012.
Poor data quality can have serious financial consequences for businesses. Read about the current state of data quality management at UK companies, including dirty data problems.
A new Ponemon survey shows that while enterprises may harbor concerns about BYOD security, business-wide use of personal mobile devices is growing rapidly.
Recent data shows that more than 50% of all networking devices are aging or obsolete and pose a security risk to the enterprise. Expert Kevin Beaver discusses how to factor device age into a security risk assessment.
The Bitcoin market is maturing but security issues, such as private key management, persist. The Bitcoin Foundation gives the good news and bad news regarding Bitcoin security.
Attendees and speakers at the CSA Congress and IAPP Privacy Academy stressed the need for better data classification to reduce the effects of cloud breaches.
Internet radio company Pandora explains how it found a strategy to embrace shadow IT and still secure cloud app usage within the company.
Docker hosting in the cloud is growing in popularity. Expert Dave Shackleford explains how Docker works and what security troubles enterprises should watch out for.
US retailer Home Depot is investigating a possible data breach of customer payment card information that is potentially greater than the Target breach.
In an advisory, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.