Articles

IT security jobs

Business processes depend enormously on information and data. These two resources are seen as some of the most valuable and powerful commodities in the world. With our world moving more high tech daily, the reliance on computers...

Is IT security keeping up with Technology?

A recent survey by Dimension Data looking at corporate network devices in 2010 showed that 73% were carrying at least one known security vulnerability. This figure was almost half (38%) in 2009. So are large organisations...

The Next Cybersecurity Threat Cycle is here - Are You Prepared?

Article contributed by Leon Ward, Field Product Manager, Sourcefire The first PC viruses appeared more than 25 years ago. Little did we realise that this was just the beginning of what would become a series of threat waves...

50% increase in demand for IT Security Jobs

Demand for IT Security jobs has soared this year, with the number of jobs advertised in the last quarter increasing by over 50% when compared to the same 3 month period in 2010. This rise in demand is not unexpected due to the...

Cyber security - one of the fastest growing sectors in IT

It is clear that cyber security is becoming an increasingly popular job sector in the IT world and even more so in the last year as there is now a greater demand for cyber security professionals in the UK than ever before. This...

An introduction to Digital Forensics

If you think that you’d like a career in IT Security but you’re not quite sure where to begin, the need for Digital Analysts is due to rise as criminals become more savvy to evolving technology in the upcoming years. Digital...

What is Cyber Security?

Cyber security is the information technology, processes and practices that protect computers, networks, data and programmes from cyber-attacks and unauthorised access via extended sources. Cyber Security is one of the fastest...

Cyber security challenges in 2015

The issues affecting businesses are similar around the world. The key issues and points of vulnerability are around human engagement – most of it innocently – such as bringing an infected personal mobile device into the corporate...

IT Security Interview Help

Most interviews start with an introduction to your basic skills and personality and general knowledge about yourself for example, why did you leave your last job? Where do you see yourself in 5 years? Describe yourself in 3 words...

Computer Security and Forensics: A Lucrative Career

The computer security and forensics career path combines information technology and law into an interesting occupation. The need for computer forensic specialists is growing every year, so getting a head now can set you up for...

IR35: What are the implications for contractors?

IR35 is a piece of UK tax legislation, introduced in 2000, and designed to tackle "disguised employment". The legislation affects freelancers working through an 'intermediary' such as a limited company. Since trading via a...