Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

UK Firms Gloomy On Security Spending

September 15, 2010

The firm's eighth annual Global State of Information Security Survey found that just 31 per cent of UK companies plan to increase spending on information security over the next year, compared to 52 per cent of global respondents.

However, the UK number may not be as low as it first appears, as the global figure is likely to have been boosted by huge investment from Asian firms, according to William Beer, director of the OneSecurity practice at PwC.

"We've seen a lot of investment in that region because firms there are recognising that their whole reputation is built on trust and securing sensitive data," he explained.

The report also highlighted a heartening shift in the reporting channel of the chief information security officer (CISO) towards key decision makers such as the chief executive and chief financial officer (CFO) rather than the chief information officer.

This year, 36 per cent of UK CISOs report to the chief executive, an increase of 13 per cent on 2007, while 15 per cent report to the CFO, an increase of 36 per cent on the 2007 figures.

"This is very reassuring because it's a definite recognition from business leaders that security needs to be dealt with," said Beer. "The penny's beginning to drop. It's not just about technology, but people and processes too."

Rather more surprisingly, UK security chiefs appeared to show a highly sceptical attitude to Web 2.0 and social networking tools.

Just a third of those surveyed had implemented the necessary technologies to support these tools, compared to 60 per cent globally.

Beer explained that this figure could be so low because the first course of action for many CISOs is to block such technologies outright, before deciding whether there is a business case for supporting their secure use within the enterprise.

View more news

 
  Most Popular
. Computer Security

. Ethical Hacking

. Windows 7: the untold story of how the enterprise gets snubbed

. Open source identity: Linux founder Linus Torvalds

. FAQ: How to protect your PC against the Downadup worm

. Brocade's new CTO takes aim at Cisco

. Heartland tries to rally industry in wake of data breach

. IBM confirms layoffs

. Apple puts iPhone Nano and Netbook rumors to rest

. Microsoft 'can't imagine' PS3 catching up to Xbox 360
 
 
  Popular Searches
 
 
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html