Raj Samani ComputerWeekly.com Raj Samani’s Most Recent Content By year: 2011 2010 2009 2008 2007 Filter by topic: Hackers and cybercrime prevention IT governance IT jobs and recruitment IT risk management ComputerWeekly.com Video: The psychologist spam king – social engineering evolves 16 Sep 2011 ComputerWeekly.com ISSA UK: Organisations must be prepared 19 Apr 2010 ComputerWeekly.com ISSA UK: ‘Treacherous Computing’ can constrain legitimate software 17 Nov 2009 ComputerWeekly.com Raise the profile of security's risk management potential 15 Sep 2009 ComputerWeekly.com No silver bullet for instant messaging security 24 Aug 2009 ComputerWeekly.com Building a profile is key to career progression 16 Jul 2009 ComputerWeekly.com Balancing cost and risk for outsourcer information assurance 15 Jun 2009 ComputerWeekly.com Defence in depth is key to application-level security 15 May 2009 ComputerWeekly.com Give users an alternative to breaching security controls 13 May 2009 ComputerWeekly.com Remote working is not all or nothing 09 Mar 2009 ComputerWeekly.com Benefits of full disk encryption lie in avoiding PR and compliance risks of breeching data 13 Feb 2009 ComputerWeekly.com Be vigilant of saboteurs' revenge cybercrime 12 Nov 2008 ComputerWeekly.com How concerned should the UK be about cyber terrorism? 26 Sep 2008 ComputerWeekly.com Will ID cards ever be in demand? 10 Sep 2008 ComputerWeekly.com ISSA: Traditional controls inadequate 07 May 2008 ComputerWeekly.com Which comes first: compliance, security or operability? 04 Apr 2008 ComputerWeekly.com Control is the key 04 Mar 2008 ComputerWeekly.com Social networking: would you shout your details in the street? 30 Jan 2008 ComputerWeekly.com Security begins with the reception desk 04 Jun 2007 ComputerWeekly.com How concerned should the UK be about cyber terrorism? 26 Sep 2008 ComputerWeekly.com Control is the key 04 Mar 2008 ComputerWeekly.com Security begins with the reception desk 04 Jun 2007 ComputerWeekly.com Which comes first: compliance, security or operability? 04 Apr 2008 ComputerWeekly.com Building a profile is key to career progression 16 Jul 2009 ComputerWeekly.com Video: The psychologist spam king – social engineering evolves 16 Sep 2011 ComputerWeekly.com ISSA UK: Organisations must be prepared 19 Apr 2010 ComputerWeekly.com ISSA UK: ‘Treacherous Computing’ can constrain legitimate software 17 Nov 2009 ComputerWeekly.com Raise the profile of security's risk management potential 15 Sep 2009 ComputerWeekly.com No silver bullet for instant messaging security 24 Aug 2009 ComputerWeekly.com Balancing cost and risk for outsourcer information assurance 15 Jun 2009 ComputerWeekly.com Defence in depth is key to application-level security 15 May 2009 ComputerWeekly.com Give users an alternative to breaching security controls 13 May 2009 ComputerWeekly.com Remote working is not all or nothing 09 Mar 2009 ComputerWeekly.com Benefits of full disk encryption lie in avoiding PR and compliance risks of breeching data 13 Feb 2009 ComputerWeekly.com Be vigilant of saboteurs' revenge cybercrime 12 Nov 2008 ComputerWeekly.com Will ID cards ever be in demand? 10 Sep 2008 ComputerWeekly.com ISSA: Traditional controls inadequate 07 May 2008 ComputerWeekly.com Social networking: would you shout your details in the street? 30 Jan 2008