Feeds

MI5 offers fear by email

Terror alerts by email

Gartner critical capabilities for enterprise endpoint backup

The Security Service MI5 will announce tomorrow that subscribers to its website can sign up for email notification of changes to the current threat level.

A spokeswoman for the Home Office said: "There will be two electronic lists, one for people interested in updates to the threat level and one for changes and updates to the website. This aims to improve public understanding of the service's work and to offer faster information about threat levels." Anyone can sign up to the lists.

There are five levels of threat: low, moderate, substantial, severe and critical. The level is set by the Joint Terrorism Analysis Centre made up of representatives of 11 government departments but run by MI5.

The level is currently "severe", Home Secretary John Reid said in early December that the chances of attack over Christmas was "highly likely"

There's more on how scared you should be here but sensitive readers should be warned the page contains a picture of John Reid.

The site also puts to rest the myth that MI5 only recruits people who are shorter than 5'11". In fact only mobile surveillance staff have to be shorter than 5'11".

More myths laid to rest here.®

5 things you didn’t know about cloud backup

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?