A Bigger Haystack…

Runciman, Brian
June 2012
ITNOW;Summer2012, Vol. 54 Issue 2, p36
Academic Journal
The BCS/RSI Annual Lecture for 2012 was entitled ‘Intelligence and Security in the Cyber Age’ and was given by Sir David Pepper KCMG, former Director of GCHQ. Brian Runciman MBCS attended.


Related Articles

  • Turing talk to tackle tools of IT crooks.  // Computer Weekly;1/13/2004, p32 

    Information technology security methods, their social and political implications and how they can be used by criminals to avoid being caught will be the topic for the annual Turing Lecture, organized by the British Computer Society and the Institution of Electrical Engineers. The lecture will be...

  • The storyteller's art.  // Computer Weekly;3/28/2006, p28 

    The article reports that Allan Paller, director of research at U.S. security body the Sans Institute, will make an important point this week when he speaks at the National Hi-Tech Crime Unit's E-Crime Congress. He will urge IT security professionals to "stop whining" about threats and instead...

  • GCHQ under fire from PAC.  // Public Private Finance;Dec2003/Jan2004, Issue 79, p7 

    Security Chiefs have admitted serious errors in the delivery of a PFI project to relocate the Government Communications Headquarters' (GCHQ) computer systems. Director of GCHQ, David Pepper and the governments security and intelligence co-ordinator David Omand, appeared before the House of...

  • The Great Firewall of Cyberspace. La Madeleine, Bonnie Lee // J@pan Inc.;Spring2006, Issue 67, p44 

    Deals with the efforts of computer companies to prevent the increasing rate of computer crimes in 2006. Importance of biometric approaches to digital and computer security; Impact of computer crimes on the financial performance of U.S. computer companies; Threats posed by computer crimes to...

  • Unmasking Spyware. Martin, Kelly // T H E Journal;Aug2004, Vol. 32 Issue 1, p18 

    Reports on spyware, a stand-alone computer program that gathers information from a targeted computer and relays it to another party. Increase in malicious code reported according to the "Symantec Internet Security Threat Report in 2003; Recommendations for preventing and controlling spyware.

  • Macs prove harder to crack.  // Building Design;3/19/2004, Issue 1617, p21 

    Focuses on the computer security advancements of Macintosh (Mac) computers.

  • Addressing access privileges. Quicke, Simon // MicroScope;6/11/2007, p26 

    The article discusses issues related to an increasing need for software resellers to prove information has been kept secure. One vendor said it had tools that monitored employee behavior and could pick up on unusual activity that might be compromising the business. Chris Durnan, managing...

  • Securing the NGN. McKeown, Ray // Telecommunications - International Edition;Aug2006, Vol. 40 Issue 8, p18 

    The article reports on the security and resilience measures taken by the next generation networks (NGN) after the public switched telephone network ends its dominance in the market. With the increased functionality and flexibility of NGN, communication providers can now be able to provide...

  • IN THE NEWS. Klopp, Charlotte // IEEE Software;Jul92, Vol. 9 Issue 4, p75 

    Discusses directives on computer technology in European Union countries. Information on Legal Protection of Computer Programs directive; What the Proposal for a Council Directives on the Legal Protection of Databases would require; Aim of the Proposal for a Council Directive Concerning the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics