Adopting a security policy around data is more efficient than the perimeter
Having a “data-centric” policy may sound like a sensible option, but according to one chief security officer most businesses have ...
Having a “data-centric” policy may sound like a sensible option, but according to one chief security officer most businesses have ...
Yahoo has announced it is to encrypt all communications and information flowing into the internet company's data centres around the ...
The report and recommendations around the NSA’s surveillance has emphasised the need to develop principles designed to create strong foundations ...
We have talked in the past about the weak link in security chain, and after law firms and third parties, ...
Yesterday saw the “opening” of the National Crime Agency that will centralise crime investigation and fighting, and tackle all types of ...
The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!
Our Address: 10 London Mews, London, W2 1HY
© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic
This site uses functional cookies and external scripts to improve your experience.
© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic
Privacy settings
Privacy Settings / PENDING
This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.
NOTE: These settings will only apply to the browser and device you are currently using.
GDPR Compliance