Mark Mayne

Recent articles by Mark Mayne

The problems and benefits of identity and access management

The problems and benefits of identity and access management

Identity and access management (IAM) is at the heart of corporate security, a difficult task with potential for great savings, as Mark Mayne explains.
Jun 30 2009 4:43PM
UK government to create Office of Cyber Security

UK government to create Office of Cyber Security

The UK Government is to create a central Office of Cyber Security (OCS) to deal with the rising level of online attacks.
Jun 26 2009 3:18PM
China backs down on Green Dam web filter

China backs down on Green Dam web filter

China appears to have given in to pressure over its controversial requirement for all new PCs to have specific blacklist filtering software installed.
Jun 17 2009 10:52AM
Unified Threat Management is expanding

Unified Threat Management is expanding

The trend for ‘security in the one box' has not stopped at UTM. Welcome to the wonders of XTM and SBA, says Mark Mayne.
Apr 7 2009 2:47PM
Security group: Vulnerability disclosure is impractical

Security group: Vulnerability disclosure is impractical

An advisory group contends that the scramble over Dan Kaminsky's DNS flaw discovery proves that full disclosure is simply not feasible.
Oct 30 2008 9:36AM
Hackers attack forensics tools

Hackers attack forensics tools

Criminals are increasingly deploying aggressive anti-forensics technology to ensure that prosecution is impossible, according to experts.
Oct 29 2008 10:20AM
Google hacking increasingly effective

Google hacking increasingly effective

Google is the search engine of choice for both consumers and hackers, according to infosec experts.
Oct 28 2008 10:04AM
Every prisoner in UK victim of data breach

Every prisoner in UK victim of data breach

The personal information of thousands of criminals in England and Wales has been lost on a USB drive.
Aug 25 2008 9:59AM
Storage: What's in store?

Storage: What's in store?

A good storage solution, backed up with the right policies, can help keep you out of the headlines and achieve compliance. By Mark Mayne
Aug 15 2008 10:56AM
Software: Safe by design

Software: Safe by design

A new industry alliance promises to pave the way for more secure software. Is SAFECode what we've been waiting for?
May 16 2008 3:47PM
Infosecurity: Go back to mainframe security

Infosecurity: Go back to mainframe security

Google calls for a return to mainframe security values
Apr 25 2008 12:41PM
Mobile devices must be secured as standard

Mobile devices must be secured as standard

Security experts call for handset manufacturers to include security as standard
Apr 25 2008 12:40PM
Infosecurity: Critical infrastructure under threat

Infosecurity: Critical infrastructure under threat

Experts believe that a rise in security threats to businesses also endangers vital infrastructure
Apr 25 2008 12:39PM
Are we being manipulated into security decisions?

Are we being manipulated into security decisions?

Security guru Bruce Schneider asked Infosec delegates to consider the psychology of security threats and their decision-making process.



Apr 24 2008 10:51AM
Data breaches drive encryption uptake

Data breaches drive encryption uptake

A sizeable 60 per cent of UK organisations have suffered at least one data breach over the last 12 months, according to a new survey.
Apr 23 2008 5:13PM
Infosecurity: RFID hacks defeat new UK passport security

Infosecurity: RFID hacks defeat new UK passport security

Researchers today demonstrated new hacking tools that allow easy and fast cloning of RFID chips, including those used in new UK biometric passports
Apr 23 2008 3:38PM
Businesses see rise in hacking attacks

Businesses see rise in hacking attacks

Businesses are reporting a massive increase in serious hacking incidents, with network intrusions reported to have rocketed from one per cent in 2006 to 13 per cent in 2007.
Apr 22 2008 5:26PM
New controls to protect data in the public sector in UK

New controls to protect data in the public sector in UK

In spite of [UK] government moves to tighten data security in the public sector, there is still much to be done, according to the information commissioner.
Apr 22 2008 5:10PM
Going solo: How to be a security consultant

Going solo: How to be a security consultant

We all dream of being our own boss, but what does it take to set up a successful business in the real world? Mark Mayne has some advice.
Mar 27 2008 12:04PM
Interview: Jorge Dinares, Panda CEO

Interview: Jorge Dinares, Panda CEO

In this SC Magazine online exclusive, Mark Mayne questions Panda Security's CEO, Jorge Dinares.
Mar 17 2008 4:04PM

Log In

Email:
Password:
  |  Forgot your password?