Intelligence key to protecting data against fraud and espionage threats

Ashford, Warwick
November 2011
Computer Weekly;11/22/2011, p7
Trade Publication
The article focuses on the importance of information security in businesses as the value of information assets increase and threats from cyber crime rise. It asserts that many of the organisations' information security is not well integrated with the entire business, which either limits the range of the business or exposes it to high levels of risk. It mentions information technology (IT) security intelligence as key for defense and protection against dangers that is crucial to business growth.


Related Articles

  • Untitled.  // Computer Weekly;9/25/2007, p91 

    The article presents information on an information technology (IT) security-related research, conducted by Gartner Group Inc., which suggests that organisations should aim to spend less of their IT budgets on security. The research further suggests that the average organisation spends 5% of its...

  • Secure Software. Niblett, Gareth // ITNOW;Dec2011, Vol. 53 Issue 6, p25 

    Welcome to Information Security Now (ISNOW) in its new home in ITNOW. Since security and IT are often inseparable neither should be ignored, says Gareth Niblett chair of BCS ISSG.

  • All about the data. Grimes, Roger A. // NetworkWorld Asia;Nov2007, Vol. 3 Issue 10, p40 

    The article offers tips on how to secure information technology infrastructure and storage system in data-centric approach. According to the author, the different efforts made by various companies to secure its security systems has only one objective which is to protect information integrity....

  • A Multi-Dimensional Classification for Users of Security Patterns. VanHilst, Michael; Fernandez, Eduardo B.; Braz, Fabrício // Journal of Research & Practice in Information Technology;May2009, Vol. 41 Issue 2, p87 

    This paper presents a classification for security patterns that addresses the needs of users. The approach uses a matrix defined by dividing the problem space along multiple dimensions, and allows patterns to occupy regions, defined by multiple cells in the matrix. It supports filtering for...

  • Harnessing IT Trends in 2014. Prabhas, Kumar // Dataquest;1/15/2014, Vol. 32 Issue 1, p30 

    The article discusses the initiatives on how to manage the Information Technology (IT) trends for future development, innovation and competitive advantage security in 2014. It states the need of organizations to look for new tools and techniques to hide sensitive information and access to the...

  • Cellular Warfare. Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2009, p192 

    In this paper we explore the possibilities of cyber warfare activities connected to cell phone networks. We analyze known attacks that originate in and/or target cellular phone networks as weapons of cyber warfare. The historic high reliability of cellular networks has caused a significant...

  • Cybersecurity Economic Issues: Clearing the Path to Good Practice. Pfleeger, Shari Lawrence; Rue, Rachel // IEEE Software;Jan/Feb2008, Vol. 25 Issue 1, p35 

    The article focuses on how organizations and security analysts manage cyber attacks and describe its consequences. It offers information on how to gather the appropriate data and how to make good trade-offs between cost and level protections. The authors present a framework for comparing...

  • ON DECK.  // SC Magazine: For IT Security Professionals (15476693);Dec2015/Jan2016, Vol. 26 Issue 12, p26 

    The article presents views from several executives about the threat of cyberattack to the information security of the businesses including Bob Ackerman, Philip Agcaoili and Gasan Awad. Topics discussed include the quality of threat intelligence to the security breach of data, the implementation...

  • CYBER SECURITY.  // Aftermarket Business;Sep2007, Vol. 117 Issue 9, p1 

    The article offers tips in providing security to laptops and other wireless communication devices. These include using strong passwords and setting remote lockdown feature, encrypting the data on the hard disk, purchasing embedded security chips which requires a personal identification number...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics