The Craziness of Passwords15th March 2010Nigel Stanley This article explores some issues about passwords, password management and user's attitudes to the use of passwords.
Database Activity Monitoring Part 4 – Compliance and Technical Architecture10th March 2010Nigel Stanley This article explores the role of database activity monitoring in an overall compliance solution, and how a solution can be architected.
Database Activity Monitoring Part 3 – Other Common Attacks3rd March 2010Nigel Stanley This article will explore how database activity monitoring deals with other types of data attacks.
Database Activity Monitoring Part 2 – SQL Injection Attacks24th February 2010Nigel Stanley In this next article covering database activity monitoring we will explore how SQL Injection attacks can be thwarted using this technology.
Database Activity Monitoring Part 1 – An Introduction16th February 2010Nigel Stanley What is database activity monitoring and how useful is it in the real world?. This is the first in a multi-part series covering this emerging area.
ICO Grows some Teeth18th January 2010Nigel Stanley The Information Commissioner's Office (ICO) is finally going to get some teeth to deal with data abuses
Encryption gets a Battering – Part 2, RSA18th January 2010Nigel Stanley In December 2009 a 768-bit RSA key was factorised. So what?
Encryption gets a Battering – Part 1, Mobile Phones14th January 2010Nigel Stanley The end of 2009 saw the world of mobile phone data encryption thrust into the media. Should you be worried?
Joining the Dots Between Security and Compliance20th November 2009Nigel Stanley How can security teams help join the dots between their security work and compliance issues?
Are IT audits like an MOT test for a car?17th November 2009Nigel Stanley Is the growth in IT-related regulations and compliance requirements following a similar trajectory to the evolution of the MOT test?