Get in-depth technical advice and product information alongside useful case studies on how UK firms are deploying the latest security technologies. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today's IT-security professionals based in the UK.
View the complete archive of Information Security Management news, research and expert advice.
Go to SearchSecurity.co.UKRecently on SearchSecurity.co.UK
Infosecurity 2012: IPv6 challenges to network security
In this video interview, Ian Kilpatrick of Wick Hill discusses the IPv6 challenges that small and medium businesses are just beginning to address.
-
More Highlights
-
Is a transition from IPv4 to IPv6 worth the effort?
Very few organizations are currently runing IPv6. Should you follow their lea...
-
Does Teredo present security risks to the enterprise?
Teredo allows internal networks to transition to IPv6, interconnecting them t...
-
OpenBSD open to remote kernel vulnerability
A flaw in several versions of the popular operating system could give attacke...
-
-
Definitions
-
CESG Good Practice Guides (GPG)
Good Practice Guides (GPG) are documents created by the CESG, which provides ...
-
Office of Cyber Security and Information Assurance (OCSIA)
The Office of Cyber Security and Information Assurance (OCSIA) is part of the...
-
CESG
CESG is the UK government's national technical authority for information assu...
-
Browse Security UK Topics
-
Compliance and Risk Management
Compliance and risk management are essential elements of a strong security system. Learn how to build a strong risk management and compliance plan in several areas. Get informat... More about Compliance and Risk Management
-
Recent Definitions
-
CESG Good Practice Guides (GPG)
- Good Practice Guides (GPG) are documents created by the CESG, which provides guidance on aspects of information assurance (IA) to ... -
Office of Cyber Security and Information Assurance (OCSIA)
- The Office of Cyber Security and Information Assurance (OCSIA) is part of the UK Cabinet O... -
CESG
- CESG is the UK government's national technical authority for information assurance (IA).
-
-
Highlights
-
More Compliance and Risk Management Topics
-
Data and Application Security Management
Data and application security management is an essential aspect of security in the enterprise. Learn application and data security best practices in several areas, including Web... More about Data and Application Security Management
-
Recent Definitions
-
barnacle
- In a computer, a barnacle is unwanted programming, such as adware or spyware, that is downloaded and installed along with a user-requested program. -
Information Security Breaches Survey (ISBS)
- The Information Security Breaches Survey is an independent security research effort in the U.K. It is carried ou... -
BS 10012:2009 (British Standard 10012:2009)
- British Standard 10012:2009 (BS 10012:2009) is a standard enacted by the U.K. government in order to further the...
-
-
Highlights
-
More Data and Application Security Management Topics
Data Protection Solutions and Strategy
Database Security Tools and Techniques
Email and Instant Messaging Security
Enterprise Data Storage
Platform and OS Security Management
Secure Coding and Application Programming
Security for Cloud Computing and Hosted Services
Virtualisation Technology Solutions and Strategy
Web Application Security
-
Network Security Management
Browse this resource center and get advice and information on network security management. Experts offer advice on several topics including endpoint security, vulnerability mana... More about Network Security Management
-
Recent Definitions
-
Cyber Security Challenge UK
- Cyber Security Challenge UK is a not-for-profit British company that runs IT security-related competitions with the aim of attracting ta... -
metamorphic malware
- Metamorphic malware is malicious software that is capable of changing its code and signature patterns with each iteration. -
Good Practice Guide 13
- Good Practice Guide 13 defines requirements for protective security monitoring that local authorities must comply with in order to prevent accid...
-
-
Highlights
-
More Network Security Management Topics
-
Secure Identity and Access Management
Browse our resource center to get advice on how implement secure identity management and access control policies and procedures. Learn more about two-factor and multifactor auth... More about Secure Identity and Access Management
-
Recent Definitions
-
Chip and PIN
- Chip and PIN is a UK government-backed initiative to implement the EMV (short for Europay, Mastercard and Visa) standard for smart payment cards... (Continued) -
UK Identity Cards Act
- The UK Identity Cards Act is a framework of enabling legislation for a British National Identity card passed in 2006. The Act has not yet gone in... -
NO2ID (NO to a national ID)
- NO2ID is a grass-roots campaign in the UK that developed in opposition to the government's proposed National Identity Scheme. In the pro...
-
-
Highlights
-
More Secure Identity and Access Management Topics