Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Catherine Everett is active.

Publication


Featured researches published by Catherine Everett.


Computer Fraud & Security | 2009

Cloud computing – A question of trust

Catherine Everett

Both the Jericho Forum and the newly-established Cloud Security Alliance (CSA) have grabbed many a headline lately in their respective attempts to assuage some of the widespread information security concerns around cloud computing. The question is, are such initiatives enough?


Computer Fraud & Security | 2010

Social media: opportunity or risk?

Catherine Everett

What are the information security risks posed by social media websites in general and Twitter in particular? Cath Everett examines where the situation stands today, how quickly the threat is growing and how well the average organisation understands the challenges involved in tackling it. She also explores why social media is growing in appeal and what this scenario is likely to mean for information security professionals. Finally, she offers best practice advice on what enterprises should consider doing to try and guard against this potential threat. Twitter appears to have been constantly in the headlines lately. If its not one survey saying that usage is exploding, its another claiming that harnessing its social networking potential has enabled x or y organisation to hugely boost its revenues despite the recession.


Computer Fraud & Security | 2003

Credit Card Fraud Funds Terrorism

Catherine Everett

Abstract The Internet is a fraudster’s charter that enables criminals to commit a cybercrime every 20 seconds, according to Steven Philippsohn, head of fraud litigation at solicitors, Philippsohn, Crawfords, Berwald.


Computer Fraud & Security | 2004

Stronger laws needed to stem spam

Catherine Everett

Abstract Without global legislation to combat spam, the problem will never be solved despite the fact that it is costs global businesses millions of dollars a year to tackle, believes the security industry.


Computer Fraud & Security | 2009

Ethics – a question of right or wrong

Catherine Everett

The problem with ethics and other such moral codes is that everyones are different. Because one persons Lone Ranger is another persons vigilante, the issue of what constitutes ethical behaviour is a subjective one.


Computer Fraud & Security | 2003

UK bank fraud gang busted

Catherine Everett

Abstract Six fraudsters have been sent down for a total of 15 and a half years, after using the Internet for social engineering purposes to swindle three UK banks out of £350 000.


Computer Fraud & Security | 2010

Privacy: a dangerous crossroads

Catherine Everett

The European Union has been firing warning shots about privacy across the bows of online vendors from Google to Facebook lately as it gears up for a wider clampdown in this increasingly controversial space.


Computer Fraud & Security | 2009

Professionalism: The old versus the new

Catherine Everett

What is being done to introduce officially-sanctioned professional certification into the information security sector? Why might such a move be important? Catherine Everett explores this question, asking how difficult such a prospect is likely to be given the fragmented nature of the industry. At the moment, the information security industry appears to be pulling in two directions. On the one hand, various organisations are actively trying to move practitioners towards chartered status and a clearly defined, formalised career path.


Computer Fraud & Security | 2009

Will the e-identity Stork deliver a European baby?

Catherine Everett

Even though membership of the European Union entitles citizens to live, work and access public services in any affiliated state, putting such rights into practice can be a bureaucratic nightmare – as anyone who has tried it will testify.


Computer Fraud & Security | 2009

Little things mean a lot

Catherine Everett

Catherine Everett looks at the mounting threat posed by data integrity attacks. She explores what form such attacks may take and how and why they might be dangerous. This article also considers why CIOs/CSOs and the vendor community have done so little to tackle the issue so far, leading to a dearth of off-the-shelf products to help. The feature likewise investigates possible solutions for addressing the problem, while raising the spectre that little is likely to be done in reality until a high profile breach takes place and organisations panic. This is a significant danger, not least because of the expense involved in dealing with the challenge, particularly during a recession. Data integrity attacks have been on the radar of both governments and the military for a good few years now, both in order to protect themselves against and to use them for their own ends. But while such risks may also have hit the consciousness of many a CIO/CSO already, so far it has spurred on all too few to take action.

Collaboration


Dive into the Catherine Everett's collaboration.

Researchain Logo
Decentralizing Knowledge