Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
By Phil Mason In the following post I will discuss ‘Progress against the Objectives of the National Cyber Security Strategy’, ‘Forward Plans’ and a few of my own predictions on what 2014 may hold for the world of cyber. Progress Is a Nice Word Rather encouragingly, much ha ...
Posted 09 January 2014 by IRM Plc
0
comments
Extending Microsoft Active Directory
Microsoft Active Directory is a database embedded in all Windows server operating systems and in Windows Azure (Microsoft’s cloud-based platform-as-a-service/PaaS offering). The directory is used to store information about objects and their attributes that are active within a given Windows net ...
Posted 06 January 2014 by Bob Tarzey
0
comments
What a year 2013 has been, for both the information security industry, and Infosecurity Magazine. This year we celebrated our 10th anniversary - happy birthday us - so I was expecting big things. And Snowden delivered. Thanks Edward. I'm not going to write about the industry’s 2013 highlights ...
Posted 19 December 2013 by Eleanor Dallaway
0
comments
How do you quantify the impact of mobility on IT security? That this is a challenge all organizations need to face up to cannot be doubted; a 2013 Quocirca research report, Digital identities and the open business, showed that 63% of businesses provide formal access to some of their business applica ...
Posted 13 December 2013 by Bob Tarzey
0
comments
What would you do if your personal computer were to get infected with the recent Cryptolocker malware – would you pay the ransom to get back your data? What if your company or government agency system got infected and paying the Cryptolocker ransom was the only way to get back critical bu ...
0
comments
It is an old mantra when it comes to IT security that the user is the weakest link, but it is one that must be addressed. Technology helps: for example, through the use of single sign on (SSO) systems with strong authentication to get around the issue of having to remember multiple usernames and pas ...
Posted 27 November 2013 by Bob Tarzey
1
comment
Identity for Sale
I’m presenting in a few weeks at the 4th Cloud Security Alliance congress  in Orlando, on the subject of Social Identity and Cloud. Specifically I’ll be talking about the emerging role of Social Identity as part of the wider trend of BYOI, or “bring your own identity” (w ...
Posted 20 November 2013 by Geoff Webb
0
comments
Seeing Through the Clouds
By TK Keanini The economics of cyber-attacks have changed over the years. Fifteen years ago, it was all about network penetration, but today advanced attackers are more concerned about being detected. Similarly, good bank robbers are concerned about breaking into the bank, but great bank robbers ha ...
Posted 20 November 2013 by Cloud Security Alliance (CSA)
0
comments
By Jonathan Gohstand The increasingly global nature of business requires companies to collaborate more and more across borders, exchanging all manner of documents: contracts, engineering documents and other intellectual property, customer lists, marketing programs and materials, and so on. Unfortun ...
Posted 20 November 2013 by Cloud Security Alliance (CSA)
0
comments
The Cloud Vis-à-Vis Disclosure
By Punam Tiwari We may not realize we’re doing so, but we all use the “cloud”. E-mail services, such as Hotmail, are cloud-based, as is the data storage tool Dropbox. Corporates in a variety of industries are adopting cloud-based software and data storage, for example Salesforce, ...
Posted 19 November 2013 by IRM Plc
0
comments
By V.Jay LaRosa While listening to one of my favorite podcasts about two months ago, I heard a quote from a man named William Gibson that really resonated with me. He said, "The future is here already, it's just not evenly distributed". As I was driving along continuing to listen, it real ...
Posted 18 November 2013 by Cloud Security Alliance (CSA)
1
comment
A new Quocirca research report underlines the importance of application delivery controllers (ADCs) and the skills needed to deploy and manage them. So, what exactly is an ADC and where can you get one? ADCs are basically next-generation load balancers and are proving to be fundamental building blo ...
Posted 18 November 2013 by Bob Tarzey
0
comments
Jurassic DDoS?
Like something from the digital ice age, distributed denial-of-service (DDoS) attacks have thawed and are roaming the cyber planet again, according to data from Google in collaboration with Arbor Networks, which provides insight into the scale and geography of recent cyber strikes. Various othe ...
1
comment
By Gavin Hill Secure Shell (SSH) is the de facto protocol used by millions to authenticate to workloads running in the cloud and transfer data securely. Even more SSH sessions are established automatically between systems, allowing those systems to securely transfer data without human intervention. ...
Posted 30 October 2013 by Cloud Security Alliance (CSA)
0
comments
Talking Privacy with TRUSTe MD EMEA
At the RSA Europe conference in Amsterdam, I had the chance to meet the newly appointed MD EMEA at TRUSTe, a data privacy management company. With a background in the ad tech space, Ken Parnham, an instantly likeable ‘say it how it is’ type of guy explains his move to TRUSTe by telling ...
Posted 29 October 2013 by Eleanor Dallaway
0
comments
At the women of Bletchley Park event earlier this month, I met with Jane Wainwright, senior manager of cybersecurity at PwC and co-founder of the Women’s Security Society (co-organizer of the Bletchley Park event). Wainwright’s impressive CV includes the role of head of corporate securit ...
Posted 28 October 2013 by Eleanor Dallaway
1
comment
The Legalities of BYOD
By Punam Tiwari In-house lawyers everywhere are finding themselves being asked more and more to revise Bring Your Own Device policies (“BYOD”). This is a concept that has been around for a number of years, but which has recently gained ground within corporates, thanks to the popularity ...
Posted 28 October 2013 by IRM Plc
0
comments
When I was invited to attend a roundtable on ‘mobility’, hosted by Canon, I was in two minds. I kind of feel like I‘ve heard it all before when it comes to BYOD and security challenges around remote working. On the other hand, it’s still a topic which interests and challenges ...
Posted 28 October 2013 by Eleanor Dallaway
0
comments
By James Wootton I started to construct this opinion piece with the flame of righteous justice dancing over my sword of indignation, ready to smite another researcher not subscribing to established responsible disclosure procedures. These are individuals who throw scraps to the army of ‘scrip ...
Posted 21 October 2013 by IRM Plc
0
comments
Patching the Perpetual MD5 Vulnerability
By Gavin Hill Earlier this month, Microsoft updated the security advisory that deprecates the use of MD5 hash algorithms for certificates issued by certification authorities (CA) in the Microsoft root certificate program. The patch has been released so that administrators can test its impact before ...
Posted 18 October 2013 by Cloud Security Alliance (CSA)
Showing 21 - 40 of 520 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×