Please click on the titles to view the blog post:
30 April, 2013: Why the role of the CISO needs to change
To better manage risk, the role of the CISO needs to be moved out from under the CIO and should report directly to the board
24 December, 2012: The value of big data in security
One of today's buzzwords is big data. Volumes of information generated are increasing rapidly, driven in part by increased take up of mobile...
03 December, 2012: Advanced threats require advanced weapons
The threats we face today are no longer smash-and-grab raids, looking for instant gain. Rather, perpetrators are looking to get a deep foothold into...
25 October, 2012: Security proving to be a fruitful area for investment
The technology landscape is changing fast, bringing much disruptive change that provides organisations with new ways to streamline their businesses,...
21 October, 2012: How telcos can grow their business and manage risk
Among the many challenges that telecommunications providers face are the need to transform and consolidate their businesses. They need to adopt new...
14 September, 2012: Trust as the foundation of security
Trust is essential for building a sustainable business. Security is essential for building trust. To build trust in electronic networks, security...
26 July, 2012: IPv6: where are we now?
According to the US government, the strength and vitality of our economy, infrastructure, public safety and national security have been built on the...
08 May, 2012: Infosec: Jailbroken devices are a threat to the network
A panel of experts at security conference Infosec has urged organisations to wake up to the risks of allowing jailbroken devices to connect to the corporate net
04 May, 2012: SC Magazine Virtual Summit - Lock Down the Mobile Front
What Does The Future Hold?
27 April, 2012: Take a more holistic view of email security
Emails are essential business communications and collaboration tools and the vast majority of business information is, at some point of its...
19 April, 2012: Keynote Panel at InfoSec 2012 - Smart Devices
I will be hosting a keynote panel at InfoSec 2012 on smart devices and security
28 February, 2012: Taking the offensive on endpoint security
The number of devices connecting to corporate networks is expanding rapidly and those devices must be managed for security reasons.
13 February, 2012: Nigel Stanley at Mobile World Congress Security Forum
Mobile World Congress Security Forum
13 February, 2012: RSA Cybercrime Trends Report 2012
An interesting report from RSA
30 January, 2012: Getting ahead in the cloud
Cloud-based computing is growing faster than the IT sector as a whole. There are plenty of analysts throwing numbers about regarding cloud spending....
16 December, 2011: Now hold your breath - the Olympic year is nearly upon us
Have you planned for the Olympic turmoil in 2012?
31 October, 2011: Migrating to Exchange 2010 and email archiving options
According to recent research, Microsoft Exchange accounts for 65% of email servers in use in organisations today. Many of these are deployments of...
03 October, 2011: BSIMM Version 3 - A Joy to Behold!
The lastest version of BSIMM - Building Security in Maturity Model has just been released [27th September 2011].
03 October, 2011: Best practices for email archiving
Given the amount of business information that is contained in the multitude of emails received and sent every day and the need to preserve business...
29 August, 2011: The security challenges of modern data centres
To reduce complexity, a high proportion of organisations are looking at modernising their data centre infrastructure through consolidation,...