RSA Conference USA 2017: 3 Reasons To Attend
Next month is the annual RSA Conference in San Francisco. Like many UK and European based organisations, we attend the RSA Conference event (#RSAC) every year. The RSA show is [...]
How to Automate Governance, Risk and Compliance (GRC) to Reduce Costs
IT Governance, Risk Management discipline, Information Security Policy and legal compliance requirements all place a burden on companies to ensure their governance, risk and compliance (GRC) policies protect customers, staff [...]
Core Principles Of Building A Secure Network Architecture
In many organisations IT projects are designed to address business objectives or as operational solutions without any thought about security. The security ‘solution’ is often bolted on at a late [...]
Lessons from Snowden: The Unmanaged SSH Key Time Bomb
Last month Snowden (the movie) was released in the US. While the film has received mixed reviews, the story behind the movie has played out very publicly over the last [...]
Can Your IT Systems Heal Themselves? Automation and Cyber security
The idea of self-healing networks is very attractive to any IT Director who wants to use valuable resources - IT staff and budget - on more strategic activities. Rather [...]
Insider Threats: Who Is The Biggest IT Security Threat In Your Organisation?
It is an undeniable fact that in today's digital world, we are all pretty much reliant on information technology and the Internet to run our businesses. It is also [...]
What Does Brexit Mean For EU Data Protection Laws?
As far as the Data Protection Landscape is concerned, Brexit couldn't have come at a more challenging time - some might say fortuitous time. In this article, I will [...]