The Consumerisation of IT has become the hottest of industry topics but with all the talk, blogs, surveys and tweets, how do you make sense of it and understand the change it represents?
News Security
Ovum Events Hybrid IaaS: Coming of Age |Compute | Store | Network
Ovum Events are proud to introduce Hybrid IaaS: Coming of Age on 27 March 2012 at the Grand Connaught Rooms in Central London. This Ovum event is designed to inform senior IT professionals about the opportunities and challenges faced when attempting to figure out which IaaS vendors and offerings to pick and mix, how to integrate them into hybrid IaaS solutions.

Congressmen Ask FTC To Investigate Google Over Safari Tracking
Google says it is working to remove cookies “inadvertently” set on Safari users’ systems

McAfee And Xerox Team Up Over Printer Security
McAfee is to extend its security software to Xerox printers, as the two companies partner up over security

Iran Blocks More Websites Ahead Of Elections
The Iranian government expands its programme of web censorship ahead of March elections

Spooks Are Looking For Skeletons In The Closet
The US government may demand access to your data in the cloud. You can encrypt your data, but that limits its value, says Eric Doyle

Courts Could Ban The Pirate Bay In The UK
A Court ruling issued today means UK ISPs may be forced to block The Pirate Bay

UK Border Agency Scraps £9m Airport Iris Scanners
The widely criticized IRIS terminals will disappear from Birmingham and Manchester airports; the rest will follow

British Student Jailed For Eight Months After Facebook Hack
Glenn Mangham imprisoned despite claiming he just wanted to help Facebook by pointing out vulnerabilities

UK Government To Demand Data On Every Call And Email
Plans could force ISPs and phone operators to hand over records on all phone calls, emails, Tweets and Facebook messages

Google Chrome, Mozilla Firefox Fix Serious Flaws
Following a major patch for Microsoft's Internet Explorer, Chrome and Firefox have also come out with fixes for a remotely exploitable flaw

US Regulators Criticise Android, iOS Child Protection
Applications for Apple's iOS and Google's Android devices don't provide enough information on how children's privacy is protected, according to the US' FTC

US Secret Service Pulls Plug On Forms Site
The US Secret Service has shut down and then reinstated online forms site JotForm, without the need for a law such as SOPA

RSA Denies X.509 Public Key Algorithm Weakness Is A Flaw
RSA accepts X.509 weaknesses but says that research revelations raise questions about poor implementation

Android Malware Increased By 3,000 Percent in 2011
Google's Android was targeted with malware more than any other mobile operating system in 2011

Centrify And Enterproid Tackle Mobile Management For iOS And Android
As mobile device management comes to the fore, Centrify and Enterproid have made BYOD-related announcements

‘Wikapedia’ And ‘Twtter’ Typosquatters Fined...
UK watchdog PhonepayPlus fines two companies promoting competitions on misspelled domain names

Official Loses Nuclear Plant Safety Test Details On USB Stick
ONR official loses USB stick containing details about Hartlepool power plant, but claims nothing "significantly sensitive" was lost

European Court Rules Social Networks Will Not Have To Hunt Pirates
The European Court Of Justice has ruled against tough anti-piracy controls, stating that it would affect freedom of speech

ICO Slaps Cheshire East Council With £80,000 Fine
The Information Commissioner has fined Cheshire East council £80,000 for not properly protecting personal data

Waledac Botnet Returns With Password-Stealing Capabilities
More than a year after Microsoft shut down the Waledac botnet, it has reawakened with far more dangerous capabilities

Certificate Authorities Warned By Mozilla About Issuing MITM SSL Certs
Mozilla has drafted a letter warning certificate authorities not to issue eavesdropping "man-in-the-middle" certificates

New Types Of Cloud Need New Types Of Security
As private and public clouds begin to interact and new types of cloud emerge, the security market is expected to grow with it, says Chris Preimesberger

Apple Promises To Improve iPhone Address Book Security
Company bows to the concerns of the US Congress over iPhone apps covertly downloading address book data
Cloud Computing: Essential Risk and Security
Cloud computing appears to offer so many benefits in the current economy - high performance, low cost, low maintenance on-line applications and services. But are they secure?

Patches Galore In February Security Fix Deluge
Between Microsoft's Patch Tuesday and Adobe's Shockwave update, IT departments have a heavy load of patches to apply

Systems Security Professionals In Demand, Says (ISC)²
More than half of the companies surveyed said they will be hiring information security staff this year

Twitter Enables Secure HTTPS By Default For All Users
Twitter joins Google to add HTTPS by default to protect users' privacy - leaving Facebook to make the move

Catbird Partners VMware To Add Firewall Controls To Virtualised...
Catbird’s vSecurity incorporates multi-function security monitoring inside the fabric of Cloud and virtual infrastructures

Emergency Services At Risk From Soft Radio Hacking
Software defined radio (SDR) is opening mobile phones to new hacking threats, warns Digital Assurance