Feeds

ITU pools experts to thwart cybercrime

Meetings about meetings

Build a business case: developing custom apps

Experts from around the world gathered in Geneva last week to discus how to fight cybercrime through international co-operation. The meeting, held under the auspices of the International Telecommunication Union, also sought to promote cybersecurity, in general.

ITU's Global Cybersecurity Agenda (GCA) aims to build on existing national and regional initiatives to avoid duplication of work and encourage collaboration amongst all relevant partners.

Around 60 experts from governments, industry, academic and research institutions as well as regional and international organisations from around the world took part in the Global Cybersecurity Agenda meeting last week. Among the participants was the minister for economic affairs in Estonia, which was the target of a co-ordinated cyber-attack in April and May this year.

Five key areas relating to the fight against cybercrime were identified: legal measures, technical and procedural measures, organisation structures, capacity building and international cooperation. The experts split into five groups to consider the challenges in each area. This work will result in five strategic reports, to be consolidated into a global roadmap and delivered to the ITU Secretary-General over an unspecified timescale.

The study groups are being led by luminaries such as Justin Rattner, chief technology officer at Intel and Ivar Tallo, senior programme officer at theUnited Nations Institute for Training and Research (UNITAR). ®

Next gen security for virtualised datacentres

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?