technology

Image for What Good is a Snapshot in a Continuously Changing Malware Landscape?
Technology

What Good is a Snapshot in a Continuously Changing Malware Landscape?

By Leon Ward, Field Product Manager, Sourcefire In my last article I wrote that advanced malware and...

24th November, 2012

Image for “Security Before, During and After the Threat” –Watchwords for Today
Technology

“Security Before, During and After the Threat” –Watchwords for Today

By Leon Ward, UK Field Product Manager, Sourcefire “An ounce of prevention is worth a pound of cure....

22nd November, 2012

Image for It’s not what you do but how you measure IT
Technology

It’s not what you do but how you measure IT

by Colin Rowland, VP EMEA, Apptio A finance department breaks down costs in multiple ways, dependent...

21st November, 2012

Image for Cybersecurity
Technology

Cybersecurity

Mike Howie, Information Security Consultant at CS Risk Management In recent months it has been hard...

19th November, 2012

Image for Proactive or Reactive – Should That Be The Question?
Technology

Proactive or Reactive – Should That Be The Question?

Avecto examines the difference between proactive and reactive digital forensics and explains their c...

8th November, 2012

Image for Windows 8: shedding some light on Microsoft’s latest trailblazer
Technology

Windows 8: shedding some light on Microsoft’s latest trailblazer

Robert Rutherford, founder and Managing Director of QuoStar Solutions. In an industry as fast-paced...

7th November, 2012

Image for BANKING ON WIRELESS
Technology

BANKING ON WIRELESS

Banks may be nervous about employing wireless systems in a highly secure environment. But the recent...

1st November, 2012

Image for How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers
Technology

How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers

Rob Sobers, Technical Manager with data governance specialist Varonis Systems www.varonis.com, analy...

26th October, 2012

Image for Security Best Practice – How to Keep the Keys to the Kingdom Safe
Technology

Security Best Practice – How to Keep the Keys to the Kingdom Safe

By Calum MacLeod, EMEA Director at Venafi Organisations of all sizes and industries maintain extensi...

24th October, 2012

Image for Providing personalised banking with the right technology
Technology

Providing personalised banking with the right technology

Craig Ramsey, ACI Worldwide, discusses how with the right technology, financial institutions can pro...

16th October, 2012

Image for Managing the Social Impact of Least Privilege Security
Technology

Managing the Social Impact of Least Privilege Security

Desktop Lockdown doesn’t mean taking the personal out of PC The technical problems associated with u...

15th October, 2012

Image for Meeting Solvency II Requirements through an Enterprise Risk Management Technology Platform
Technology

Meeting Solvency II Requirements through an Enterprise Risk Management Technology Platform

By Glenn Lottering, Senior Director EMEA, Oracle Insurance – October 2012 The Solvency II directive–...

10th October, 2012