Compliance Regulation and Standard Requirements, Data Breach Incident Management and Recovery, IT Security Frameworks and Standards, IT Security Jobs, Careers and Certification Training, Information Security Risk Assessment: Methodology and Analysis, Security Policies and User Awareness
Data Protection Solutions and Strategy, Database Security Tools and Techniques, Email and Instant Messaging Security, Enterprise Data Storage, Platform and OS Security Management, Secure Coding and Application Programming, Security for Cloud Computing and Hosted Services, Virtualisation Technology Solutions and Strategy, Web Application Security
Endpoint and NAC Protection, Network Security Monitoring: Tools and Systems, Threat and Vulnerability Management, Virtual Private Network Security, Wireless Network Security: Setup, Issues and Threats
SearchSecurity.co.UK Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
SearchNetworkingUK Briefs provides a summary of the week’s new product, services and appointment announcements. This week includes mobile management and much more.
Some question the path to network convergence - is it through FCoE or iSCSI? Either way, preparing the existing infrastructure will be key to a healthy network environment.
Many network managers may have an emotional resistance to cloud computing, but experts explain the economic benefits and positive career impact outsourcing data centre resources can have.
This month's IT in Europe examines the views of the experts on the new EU framework, and assess what it means for European IT managers.
Download Technology Priorities for 2012
This month's IT in Europe examines how you can prepare for the new EU data regulations.
Roundtable discussion on business value of big data, chaired by Brian McKenna, Editor, SearchDataManagementUK, and featuring Mike Ferguson, Roxane Edjlali (Gartner), Joshua LeCure (GlaxoSmithKline).
Find out where to hone your business intelligence, data management and data warehouse skills with this list of training courses for 2012.
Poor data quality can have serious financial consequences for businesses. Read about the current state of data quality management at UK companies, including dirty data problems.
Social media compliance is not typically considered a big issue for companies, but expert Mike Chapple explains why it should be.
The Community Health data breach exposed the personal data of 4.5 million patients of the healthcare entity, opening up potential regulatory issues.
Running an authenticated vulnerability scan can help detect flaws in your system, yet many organizations don't invest in this methodology. Security expert Kevin Beaver discusses five ways to get the most out of an authenticated vulnerability scan.
Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.
Virtual DMZ cloud configurations require specific security tactics. Expert Dejan Lukan looks at the different types of virtual DMZs and how they differ from physical DMZs.
IBM made its second cloud security acquisition in as many weeks with the purchase of Lighthouse Security Group, which specializes in cloud-based IAM services.
Arguably the most important task of any endpoint security system is to protect against malware. However, these products are less effective as attackers develop increasingly novel ways of sidelining device security.
Indian organizations are waking up to the risks that weak security causes as business becomes digitized
Despite what may be a dangerous new Active Directory "pass the hash" attack variant, Microsoft has downplayed the issue as a technical limitation.