How to Create an Effective Incident Response Plan

How to Create an Effective Incident Response Plan

Introduction An organization’s incident response plan (IRP) should be their first line of defense against attacks and threats. IRPs are manuals that describe how organizations detect and limit the... Go on to the site to read the full article ... Read More
How to Structure Your CSIRT or SOC Team

How to Structure Your CSIRT or SOC Team

Organizations must consider their wider security requirements before deciding if they require a CSIRT, a SOC or both. Pronounced see-sirt, a computer security incident response team (CSIRT) performs... Go on to the site to read the full article ... Read More
11 Points to Consider When Virtualizing Security

11 Points to Consider When Virtualizing Security

Virtualized computing resources can save organizations money, but awareness of the security implications must be to the fore in any discussion As the name suggests, virtualization creates a virtual... Go on to the site to read the full article ... Read More
A Step-by-Step Guide to Data Security Compliance by Industry

A Step-by-Step Guide to Data Security Compliance by Industry

Knowing what expertise is available and which standards are relevant to your sector are the first steps to ensure organizations are regulation compliant. In our previous article we introduced some... Go on to the site to read the full article ... Read More
A Look at Data Security Compliance & Regulations by Industry

A Look at Data Security Compliance & Regulations by Industry

Introduction Understanding and complying with regulations provides companies with business opportunities and reduces risk. To many, information security looks to be governed by an ever-changing... Go on to the site to read the full article ... Read More
NDG Pt. 3: The Impact of new data security standards and opt-out model on the IG Toolkit

NDG Pt. 3: The Impact of new data security standards and opt-out model on the IG Toolkit

| | General Security
Previous articles in this series: Pt. 1: Data security standards and opt-out models in health and social care Pt. 2: Government Views On Opting Out – Health Data and Security in The UK The... Go on to the site to read the full article ... Read More
Data security standards and opt-out models in health and social care

Data security standards and opt-out models in health and social care

| | General Security
While the technical aspects of sharing patient data in health and social care continue to evolve, the Review of Data Security from the National Data Guardian focuses on the more permanent issue of... Go on to the site to read the full article ... Read More
Network Management for Next-Generation Wireless Security

Network Management for Next-Generation Wireless Security

| | General Security
Introduction In the good old days, ICT research used to be just about technology. The success of any research project could easily be measured in terms of technical advances achieved. Back then,... Go on to the site to read the full article ... Read More