Information Security

Group founded 04 Apr 2007
Posts 205
Members 40
Group summary

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

More blogs
See all Blogs »
Retired Member

Metadata catches politicians out again...and again..

What is it about politics and embarrassing metadata? UK readers will be familiar with the row about dodgy political donations that is currently surrounding the Labour party. It was perhaps only a ma...

03 Dec 2007
Retired Member

ILP - it's always someone else's fault

Given that much of my time spent in conversations around metadata leakage being someone else's fault / responsibility, it was fascinating to watch the Chancellor's performance in the House this aftern...

20 Nov 2007
Retired Member

Credit card numbers fraud; what is the hidden cost?

Perhaps we should not be surprised, but every time one of these stories concerning multi-million dollar organised cyber crime hits the headlines, the sheer scale of the operation is startling, even to...

12 Nov 2007
Retired Member

A Fintech Opportunity in National Security

In July, 2003, the Pentagon's Defense Advanced Research Projects Agency (DARPA) scuttled an ill-conceived terrorism futures market. While the project was a political failure, the idea underscores the...

06 Nov 2007
Retired Member

Disappointing....

Very disappointing, as I am sure we all agree. Doubly so knowing Lord Erroll's dedication and enthusiasm for the work of the Committee (having heard his impassioned views on the issues at our recent I...

31 Oct 2007
Retired Member

Those embarrassing little - and not so little - leaks

Interestingly, this was exactly the topic of conversation at a couple of CIO / CTO level Information Security dinners that we have hosted in the city recently, and follows hot (OK, warm) on the heels ...

24 Sep 2007
Retired Member

Top 100 Network Security Tools

Fyodor, the author of the popular Nmap FOSS for network exploration or security auditing, has released the list of the top 100 network security tools (excluding Nmap). He has compiled the list based ...

04 Sep 2007
Retired Member

Fallen Citadel: Malware Attack on Bank of India

Story URL: http://www.theregister.co.uk/2007/09/01/bank_of_india_website_takeover/ The recent, crippling, malware attack on the website of Bank of India (http://www.bankofindia.com) is a stark remind...

03 Sep 2007
Retired Member

The Insider Threat

Interesting to watch the increasing trend in the security industry of thinking more about insider threats. Is this because companies are feeling more on top of the external hackers and viruses, or a g...

15 Aug 2007
Elton Cane

HSBC Australia shoots the messenger

Banks and their customers have very different ideas about what constitutes "sensitive data", and what communication should take place if data security is compromised. And one bank in particu...

04 May 2007

Now hiring