Feeds

Mind the gap!

Step by step security

  • alert
  • submit to reddit

Intelligent flash storage arrays

Webcast When it comes to security we seem start out with the best intentions and have Fort Knox protecting our applications, data and interactions.

But shrinking budgets and juggling priorities often means it's a case of good intentions rather than vault like security.

The result is either a security patchwork that has the potential for things to leak through the gaps, or a blanket approach that is expensive and difficult to implement.

Getting on top of the problem may mean turning the whole approach to security around.

On this Regcast “Mind the Gap”, BitDefender’s Andrew Maguire joins Andrew Buss from FreeForm Dynamics and our Reg Broadcast Editor Tim Phillips to discuss and breakdown:

  • Key changes in the threat environment.
  • Understanding the value of data.
  • Practical steps that can be taken to make security work for your business.

Tune in to this free ‘on demand’ event at your convenience by clicking here. ®

Remote control for virtualized desktops

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.