Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
Smart Thinking
Most people may not immediately recognize the name Reinhold Niebuhr, but they are probably familiar with some version of his best known prayer: "God grant me the serenity to accept the things I cannot change, courage to change the things I can change, and the wisdom to know the difference.&q ...
Posted 01 July 2011 by Geoff Webb
0
comments
A recent Washington Post article, “The great jobs mismatch”, points out that structural unemployment is caused by a mismatch between types of positions available and those who have the wrong skill sets to meet them. The information technology area, particularly information security, has ...
0
comments
In people we trust...
 So, thus begins my blog. Admittedly, it’s long overdue. My intention to blog has been very honourable (honestly), it’s just the ‘actually doing it’ bit which has been a little slack, to say the least. Yesterday, I spent the day at The Security Company – a wonde ...
Posted 29 June 2011 by Eleanor Dallaway
0
comments
By Matthew Gardiner When you meet someone you have never met for the first time, in a place you have never been to, do you trust him? Would you have him hold your wallet for you or would you share some sensitive personal information with him? Of course not. Obviously this person is not trusted by ...
Posted 28 June 2011 by Cloud Security Alliance (CSA)
0
comments
Often when I chat with people within the industry, the one thing I expect is a consistent message akin to a broken record. De-perimiterization, consumerization, defense in depth – the list of things I hear brought up in nearly every conversation is as fine tuned as a political candidate&rsqu ...
Posted 23 June 2011 by Drew Amorosi
0
comments
Unhealthy Irritation
I have to admit, I find this sort of thing just irritating: The Register last week reported that eight million patient records were lost on a laptop. Unencrypted records.  No, really. As a spokesperson for the UK's National Health Service (NHS) said: "We have set clear standards for NHS ...
Posted 20 June 2011 by Geoff Webb
0
comments
In a recently released report titled “Wi-Fi Positioning Systems: Beware of Unintended Consequences”  – by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, and Kim Cameron, a leading digital identity expert – indicates that availability of mobile device ...
Posted 16 June 2011 by Ajay Gupta
1
comment
The Human Factor Reigns Supreme!
Do you know who has access to your computer? Many agencies and corporations spend a majority of their budgets on new technological security software gimmicks while forgetting the human factor. Personnel security must be included as an integral part of information security. All of the technological ...
0
comments
Wild West of Data Security
Question for the day: What can the turn-of-the century cattle industry teach us about cloud security? Quite a lot, I believe – especially by the ways in which driving cattle and keeping data secure are so very different. Back in the 1880s driving cattle across the US was big business. Mi ...
Posted 31 May 2011 by Geoff Webb
0
comments
Finding a Home for BitLocker
With the last several posts being about BitLocker  (and especially Recovery Keys) hopefully you now have some idea of the things you will want to think about when planning for a BitLocker deployment.  Beyond that, however, the obvious question that now needs to be addressed is: Where ...
Posted 17 May 2011 by Geoff Webb
0
comments
While the Federal Government shutdown was averted thanks to some last-minute political gerrymandering and concessions by both sides of the aisle, it’s quite instructive to reflect on the implications of shutdown on the federal cybersecurity workforce, including contracts and contractors. More ...
2
comments
By Matthew Gardiner Everyone loves standards, right? When is the last time you heard a vendor proudly say that their product or service was closed and proprietary? However, it also seems that every time a new IT architecture sweeps through the market, this time one based on cloud models, the ...
Posted 09 May 2011 by Cloud Security Alliance (CSA)
0
comments
By Paul Madsen Federation is a model of identity management that distributes the various individual components of an identity operation amongst different actors. The presumption being that the jobs can be distributed according to which actors are best suited or positioned to take them on. For insta ...
Posted 03 May 2011 by Cloud Security Alliance (CSA)
0
comments
Who Moved My Cloud?
By Allen Allison Managed cloud services are quickly being adopted by large enterprises. Organizations are increasingly embracing cloud technologies for core services like financial systems, IT infrastructure, online merchant sites, and messaging solutions. This adoption rate is creating an ever-i ...
Posted 03 May 2011 by Cloud Security Alliance (CSA)
0
comments
By Mark Bregman Chief Information Security Officers know instinctively that the world under their purview is undergoing a shift every bit as significant as the rise of the World Wide Web more than 15 years ago. The demand on our workforce to be ever more productive is driving us to rethink how we u ...
Posted 29 April 2011 by Cloud Security Alliance (CSA)
1
comment
Never confuse a single defeat with a final defeat.  – F. Scott Fitzgerald So last week was, depending on who you ask, a terrible week for "The Cloud," a wakeup call for businesses who want to use cloud services, or nothing all that surprising. In case you have only just e ...
Posted 28 April 2011 by Geoff Webb
0
comments
Protect the API Keys to your Cloud Kingdom
By Mark O’Neill Much lip service is paid to protecting information in the Cloud, but the reality is often seat-of-the-pants Cloud security. Most organizations use some form of API keys to access their cloud services. Protection of these API keys is vital. This blog post will explore the iss ...
Posted 20 April 2011 by Cloud Security Alliance (CSA)
0
comments
By Stuart Lisk, Senior Product Manager, Hubspan Are you losing sleep over whether to implement tokenization or full encryption as your cloud security methodology? Do you find yourself lying awake wondering if you locked all the doors to your sensitive data? Your “sleepless with security&rdquo ...
Posted 20 April 2011 by Cloud Security Alliance (CSA)
0
comments
Constant Vigilance
By Jon Heimerl   Constant Vigilance. Mad-Eye Moody puts it very well. Constant Vigilance. Unfortunately, these days we need constant vigilance to help protect ourselves and companies from peril. That is not to say that we can never relax and breathe. This is based on a key part of any decen ...
Posted 14 April 2011 by Cloud Security Alliance (CSA)
0
comments
Last time  I covered an introduction to BitLocker, the Trusted Platform Module (TPM) and what TPM does to assist in keeping your system secure. This time I'm writing about the most important aspect of BitLocker management – Recovery Keys (and Recovery Passwords too).  While one ...
Posted 14 April 2011 by Geoff Webb
Showing 321 - 340 of 512 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×