Practices for Enhancing Data Security - a survey of organisations in the UK and the US
Published: 23rd February 2015 | By: Fran Howarth
This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.
IBM: enhanced 360° view
Published: 19th October 2014 | By: Philip Howard
This paper briefly considers relevant IBM technologies and solutions in the context of the requirements discussed
Security intelligence: solving the puzzle for actionable insight
Published: 8th September 2014 | By: Fran Howarth
The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent
The need to protect against file-based attacks - statistical evidence for the need for greater assurance
Published: 21st February 2014 | By: Fran Howarth
The underlying structure of many document types makes it a relatively easy task to embed malicious code, downloading malware onto the devices of those users.
Technology evolution & its impact on security - why the endpoint must be the new focus
Published: 24th October 2013 | By: Fran Howarth
Organisations will benefit from investing in security technologies that provide greater insight into activity occurring on both their networks and the systems.