Posts Tagged ‘strong authentication’

Are UK companies being left vulnerable by their CIOs?

0

Posted on 23rd Oct 2012 by in Enterprise

We had a great reaction from our followers on our research into the issues that are keeping CIOs awake at night. Here on the blog we discussed the findings across the United Kingdom, France, Germany, the USA and the Nordics. Let’s take a look the UK findings in more detail. If you’ve seen or shared […]

Is Bruce Willis trying to take a byte out of Apple?

0

Posted on 7th Sep 2012 by in Corporate

In his iconic role as cop John McClane, star of the Die Hard series, Bruce Willis became renowned for foiling the antics of some of Hollywood’s most notorious bad guys. But, according to recent reports, Bruce has now set his sights on an altogether different opponent. A number of news organisations across the globe have […]

TechEd 2012 – Were you there?

0

Posted on 3rd Aug 2012 by in Enterprise

Microsoft may not be renowned for throwing wild parties, but when you gather over 7,500 people in Amsterdam for a week, you’re bound to come back with some stories. I had the pleasure of attending Microsoft’s TechEd conference last month, an event dedicated to conferences, workshops and hands-on sessions with IT professionals and developers. Nestled […]

Who’s really in charge when it comes to security?

2

Posted on 29th Jul 2012 by in Enterprise

In the latest of our series of blog posts looking at the results of our recent CIO research, we take a look at the thorny subject of who is ultimately responsible for information security within an organization. Prevailing trends in technology would suggest that maintaining control of IT security is becoming an ever more difficult […]

To BYOD or not to BYOD – A CIO headache

0

Posted on 11th Jul 2012 by in Enterprise

The next in our series of blog posts looking at the security issues affecting CIOs in the modern era focuses on the rise of personal internet devices being used at work. In fact, there’s a good chance you’re reading this post on a personal device, perhaps on an enterprise internet connection? It’s something we’re all […]

How much control do CIOs have over confidential information shared by their executives? – Question from Ardaman Kohli

0

Posted on 28th Jun 2012 by in Enterprise

Following on from our recent post on who is responsible for the security function, here is the second in our series of posts revealing the results of our research into the attitudes of CIOs. Next on our agenda is the above question from Ardaman Kohli. It’s true that it doesn’t matter how secure CIOs themselves […]

Who is principally responsible for managing IT security in companies? – Question from Martin McKeay at Network Security Blog

0

Posted on 18th Jun 2012 by in Enterprise

Those with long memories may recall our call-out a few months ago asking for readers’ questions on global CIO’s attitudes towards security. We wanted to find out the burning security issues which are affecting CIOs today and we received a lot of interesting responses from readers and influencers who had their own questions that they […]

LinkedIn hack sheds light on inherent weakness of passwords

0

Posted on 8th Jun 2012 by in Enterprise

Earlier this week, amidst reports that more than 6.5 million passwords may have been compromised in a hack of a LinkedIn database, I received several calls and emails from friends and family that feared the worst of their LinkedIn accounts, especially after LinkedIn’s Vicente Silveira took to the company’s blog to confirm the reports. Silveira […]

LinkedIn security breach: What’s your password?

0

Posted on 7th Jun 2012 by in Enterprise

Another major breach was announced in our social media world today. This time LinkedIn was the target and more than six million users are the potential victims. A Russian hacker claims the theft of 6,458,020 encrypted LinkedIn passwords and to prove it, posted the passwords on his website (thankfully without usernames). In addition, he asked […]

Forget privacy? Big Brother is watching you

0

Posted on 1st Jun 2012 by in Enterprise

Now I don’t want to be accused of fear mongering, but I recently came across a website that has an alarming amount of my personal data on file without me knowing. In fact, if you live in the US, it probably has most of yours too. I’m not averse to sharing my name; gender and […]