Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
By Mark Brown Much has been made of Microsoft’s decision to stop security support for Windows XP over the last few weeks. Some commentators have likened it to something of a Y2K-esque tech apocalypse with fears of a field day for hackers and cybercriminals, and others have derided the doom-m ...
Posted 16 April 2014 by Ernst & Young LLP
0
comments
A Legal Perspective on Big Data
By Punam Tiwari On my return home from my Cheltenham Head Office one evening, I happened upon an opinon article quite randomly lying around in the train by David Aaronovitch of The Times, titled “Privacy activists don’t speak for most of us”. The article dealt with Google&rsq ...
Posted 14 April 2014 by IRM Plc
0
comments
It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for three reasons: first, better code is likely to be released in the first place; second, it will be le ...
Posted 21 March 2014 by Bob Tarzey
0
comments
My Apology Letter to Edward Snowden
Nine months and counting – nine months since Edward Snowden first told the world that the US government logged the metadata of all telephone traffic. Shortly after came PRISM, involvement by the UK government’s GCHQ, and XKeyscore. We’ve learned that the NSA monitored communication ...
Posted 17 March 2014 by Drew Amorosi
0
comments
Convergence of SIEM and Forensics
Sometimes technology areas that once seem distinct converge. Indeed, there was a time when the term convergence was used, without qualification, to refer to the coming together of IT and traditional telephone networks, something that for many is now just an accepted reality. During two recent discu ...
Posted 10 March 2014 by Bob Tarzey
0
comments
The protection of personal data has been back in the news in the UK over the last month due to the government bungling plans to make anonymized NHS patient data available for research. The scheme gives NHS patients the option to opt-out of sharing their data: why? NHS care in the UK is mostly provid ...
Posted 10 March 2014 by Bob Tarzey
0
comments
Here’s a dull-sounding question: Imagine a world without SSL (secure sockets layer) or its successor TLS (transport layer security)? A security tech-head may find the whole thing quite interesting, but for the average IT user, despite relying on SSL day-in, day-out, it will not arouse much exc ...
Posted 03 March 2014 by Bob Tarzey
0
comments
By Jack Buckle Technology plays such a critical role in organizations, and their consequent environmental threats are numerous and dynamic. In light of this, how can your business proactively maximize cybersecurity, as opposed to approaching it in a reactive manner? It’s a cliché, b ...
Posted 25 February 2014 by IRM Plc
0
comments
Let’s Stay Together
The information security industry is at war – with itself. A civil war occurring simultaneously with the more widely publicized war against cybercrime, and whatever and whomever threatens the security of information. Consensus says that defense is almost always at a disadvantage, of which inf ...
Posted 11 February 2014 by Eleanor Dallaway
0
comments
At this year’s Governing Outlook in the States & Localities conference, a panel of chief information security officers (CISOs) from state and local governments addressed the topic: “CYBER SECURITY: One of the Nation’s Most Serious Challenges.” Participants provided insigh ...
0
comments
Why Would they DoS Us?
As various pundits have reeled off their security advice for 2014, many have listed the growing threat of denial-of-service (DoS) attacks as something to look out for. They are probably right to do so; two recent publications, the Arbor Worldwide Infrastructure Security Report (WISR) and the Prolexi ...
Posted 10 February 2014 by Bob Tarzey
0
comments
Social Media in the Workplace
By Punam Tiwari The security issues of social media use in the workplace has been written about extensively, and yet it still enjoys as relevant a place in the work context now as it did previously. We all work longer hours these days in comparison to our parents’ generations, and it strikes ...
Posted 23 January 2014 by IRM Plc
0
comments
By Dan Dagnall Federation is definitely a hot topic these days, with NSTIC attempting to create an identity ecosystem, InCommon continuing to build its service-provider federation, and state-level initiatives gearing up (some are already operational) to provide federated identity services to four-y ...
Posted 09 January 2014 by Cloud Security Alliance (CSA)
0
comments
By Phil Mason In the following post I will discuss ‘Progress against the Objectives of the National Cyber Security Strategy’, ‘Forward Plans’ and a few of my own predictions on what 2014 may hold for the world of cyber. Progress Is a Nice Word Rather encouragingly, much ha ...
Posted 09 January 2014 by IRM Plc
0
comments
Extending Microsoft Active Directory
Microsoft Active Directory is a database embedded in all Windows server operating systems and in Windows Azure (Microsoft’s cloud-based platform-as-a-service/PaaS offering). The directory is used to store information about objects and their attributes that are active within a given Windows net ...
Posted 06 January 2014 by Bob Tarzey
0
comments
What a year 2013 has been, for both the information security industry, and Infosecurity Magazine. This year we celebrated our 10th anniversary - happy birthday us - so I was expecting big things. And Snowden delivered. Thanks Edward. I'm not going to write about the industry’s 2013 highlights ...
Posted 19 December 2013 by Eleanor Dallaway
0
comments
How do you quantify the impact of mobility on IT security? That this is a challenge all organizations need to face up to cannot be doubted; a 2013 Quocirca research report, Digital identities and the open business, showed that 63% of businesses provide formal access to some of their business applica ...
Posted 13 December 2013 by Bob Tarzey
0
comments
What would you do if your personal computer were to get infected with the recent Cryptolocker malware – would you pay the ransom to get back your data? What if your company or government agency system got infected and paying the Cryptolocker ransom was the only way to get back critical bu ...
0
comments
It is an old mantra when it comes to IT security that the user is the weakest link, but it is one that must be addressed. Technology helps: for example, through the use of single sign on (SSO) systems with strong authentication to get around the issue of having to remember multiple usernames and pas ...
Posted 27 November 2013 by Bob Tarzey
1
comment
Identity for Sale
I’m presenting in a few weeks at the 4th Cloud Security Alliance congress  in Orlando, on the subject of Social Identity and Cloud. Specifically I’ll be talking about the emerging role of Social Identity as part of the wider trend of BYOI, or “bring your own identity” (w ...
Posted 20 November 2013 by Geoff Webb
Showing 1 - 20 of 513 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×