Compliance Regulation and Standard Requirements, Data Breach Incident Management and Recovery, IT Security Frameworks and Standards, IT Security Jobs, Careers and Certification Training, Information Security Risk Assessment: Methodology and Analysis, Security Policies and User Awareness
Data Protection Solutions and Strategy, Database Security Tools and Techniques, Email and Instant Messaging Security, Enterprise Data Storage, Platform and OS Security Management, Secure Coding and Application Programming, Security for Cloud Computing and Hosted Services, Virtualisation Technology Solutions and Strategy, Web Application Security
Endpoint and NAC Protection, Network Security Monitoring: Tools and Systems, Threat and Vulnerability Management, Virtual Private Network Security, Wireless Network Security: Setup, Issues and Threats
SearchNetworkingUK Briefs provides a summary of the week’s new product, services and appointment announcements. This week includes mobile management and much more.
Some question the path to network convergence - is it through FCoE or iSCSI? Either way, preparing the existing infrastructure will be key to a healthy network environment.
Many network managers may have an emotional resistance to cloud computing, but experts explain the economic benefits and positive career impact outsourcing data centre resources can have.
This month's IT in Europe examines the views of the experts on the new EU framework, and assess what it means for European IT managers.
Download Technology Priorities for 2012
This month's IT in Europe examines how you can prepare for the new EU data regulations.
Roundtable discussion on business value of big data, chaired by Brian McKenna, Editor, SearchDataManagementUK, and featuring Mike Ferguson, Roxane Edjlali (Gartner), Joshua LeCure (GlaxoSmithKline).
Find out where to hone your business intelligence, data management and data warehouse skills with this list of training courses for 2012.
Poor data quality can have serious financial consequences for businesses. Read about the current state of data quality management at UK companies, including dirty data problems.
The newly launched Apple Pay mobile payment system could deliver the most secure shopping experience for U.S. customers yet, though it still may not be perfect.
A variety of malware that steals passwords from jailbroken iPhones and iPads is becoming an enterprise concern. Expert Nick Lewis explains how to mitigate the risk.
The October 2014 Oracle CPU delivered fixes for 154 unique bugs, with Java vulnerabilities making up the bulk of the most pressing updates.
More potential trouble for Apple iCloud users as a nationwide man-in-the-middle attack struck the iCloud website in China amid the country's launch of the new iPhone 6.
Planning a data backup strategy on a private cloud requires certain factors to assure security. Expert Dejan Lukan gives some advice on what to take into consideration.
Dropbox refuted reports that a hacker had obtained 6.9 million customer usernames and passwords from the cloud storage service, but encouraged customers to use its 2FA security feature regardless.
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said.
Apple has recently come under fire over the security of its customers' data, but the company has done a “nice job” using best practices to secure iTunes backups, according to a security researcher.