Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
  By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB)   In a recent article, "Infosec Joblessness Remains Steady, at 0%", Govinfosecurity.com editor, Eric Chabrow, discussed the startling fact that employment in the information security analyst car ...
0
comments
Black, Yellow, Blue: By John Walker
I'm posting this blog on behalf of John Walker, whose account is temporarily having some 'down time'... Recent reports have stated that the Anonymous Hacktivists group is to set up its own social networking site and service, after they were understandably rejected from the fledgling Google+ si ...
Posted 21 July 2011 by Eleanor Dallaway
0
comments
PKI Still Matters, Especially in the Cloud
 By: Merritt Maxim Director of IAM Product Marketing CA Technologies Inc. Infosec veterans probably remember (with a smirk) how Public Key Infrastructure (PKI) was heralded as the next “big thing” in information security at the dawn of the 21st century. While PKI failed to reac ...
Posted 15 July 2011 by Cloud Security Alliance (CSA)
0
comments
Mitigating denial of service attacks
The common view of a denial of service (DoS) attack is that of a flood of requests to a given web server that overwhelms it and render it useless, at least temporarily. Such attacks have most commonly been perpetrated via botnets, a network of hijacked computers compromised by malware coordinated by ...
Posted 13 July 2011 by Bob Tarzey
0
comments
 By Fahim Siddiqui Despite a broader interest in cloud computing, many organizations have been reluctant to embrace the technology due to security concerns. While today’s businesses can benefit from cloud computing’s on-demand capacity and economies of scale, the model does require ...
Posted 11 July 2011 by Cloud Security Alliance (CSA)
0
comments
Watch Out for the Top 6 Cloud Gotchas!
 By Margaret Dawson I am a huge proponent of cloud-based solutions, but I also have a bailiwick for people who look to the cloud just for cloud’s sake, and do not take time to do the due diligence. While the cloud can bring strong technical, economic and business benefits if managed cor ...
Posted 11 July 2011 by Cloud Security Alliance (CSA)
0
comments
The Cost of a Data Breach
As I have done in a previous post, I am taking this opportunity to share with our online audience some of the letters we receive regarding our online and print coverage. This letter comes from a reader of our most recent issue, and my response to his comments can be found below the letter. As always ...
Posted 08 July 2011 by Drew Amorosi
0
comments
I hope that by now you have heard the good news? (If not, please click here to read the press release)...   With immediate effect, Infosecurity Magazine (with its website and online programmes) has merged with the Infosecurity Europe show, owned by Reed Exhibitions. The press release has go ...
Posted 06 July 2011 by Eleanor Dallaway
0
comments
Smart Thinking
Most people may not immediately recognize the name Reinhold Niebuhr, but they are probably familiar with some version of his best known prayer: "God grant me the serenity to accept the things I cannot change, courage to change the things I can change, and the wisdom to know the difference.&q ...
Posted 01 July 2011 by Geoff Webb
0
comments
A recent Washington Post article, “The great jobs mismatch”, points out that structural unemployment is caused by a mismatch between types of positions available and those who have the wrong skill sets to meet them. The information technology area, particularly information security, has ...
0
comments
In people we trust...
 So, thus begins my blog. Admittedly, it’s long overdue. My intention to blog has been very honourable (honestly), it’s just the ‘actually doing it’ bit which has been a little slack, to say the least. Yesterday, I spent the day at The Security Company – a wonde ...
Posted 29 June 2011 by Eleanor Dallaway
0
comments
By Matthew Gardiner When you meet someone you have never met for the first time, in a place you have never been to, do you trust him? Would you have him hold your wallet for you or would you share some sensitive personal information with him? Of course not. Obviously this person is not trusted by ...
Posted 28 June 2011 by Cloud Security Alliance (CSA)
0
comments
Often when I chat with people within the industry, the one thing I expect is a consistent message akin to a broken record. De-perimiterization, consumerization, defense in depth – the list of things I hear brought up in nearly every conversation is as fine tuned as a political candidate&rsqu ...
Posted 23 June 2011 by Drew Amorosi
0
comments
Unhealthy Irritation
I have to admit, I find this sort of thing just irritating: The Register last week reported that eight million patient records were lost on a laptop. Unencrypted records.  No, really. As a spokesperson for the UK's National Health Service (NHS) said: "We have set clear standards for NHS ...
Posted 20 June 2011 by Geoff Webb
0
comments
In a recently released report titled “Wi-Fi Positioning Systems: Beware of Unintended Consequences”  – by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, and Kim Cameron, a leading digital identity expert – indicates that availability of mobile device ...
Posted 16 June 2011 by Ajay Gupta
1
comment
The Human Factor Reigns Supreme!
Do you know who has access to your computer? Many agencies and corporations spend a majority of their budgets on new technological security software gimmicks while forgetting the human factor. Personnel security must be included as an integral part of information security. All of the technological ...
0
comments
Wild West of Data Security
Question for the day: What can the turn-of-the century cattle industry teach us about cloud security? Quite a lot, I believe – especially by the ways in which driving cattle and keeping data secure are so very different. Back in the 1880s driving cattle across the US was big business. Mi ...
Posted 31 May 2011 by Geoff Webb
0
comments
Finding a Home for BitLocker
With the last several posts being about BitLocker  (and especially Recovery Keys) hopefully you now have some idea of the things you will want to think about when planning for a BitLocker deployment.  Beyond that, however, the obvious question that now needs to be addressed is: Where ...
Posted 17 May 2011 by Geoff Webb
0
comments
While the Federal Government shutdown was averted thanks to some last-minute political gerrymandering and concessions by both sides of the aisle, it’s quite instructive to reflect on the implications of shutdown on the federal cybersecurity workforce, including contracts and contractors. More ...
2
comments
By Matthew Gardiner Everyone loves standards, right? When is the last time you heard a vendor proudly say that their product or service was closed and proprietary? However, it also seems that every time a new IT architecture sweeps through the market, this time one based on cloud models, the ...
Posted 09 May 2011 by Cloud Security Alliance (CSA)
Showing 321 - 340 of 520 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×