Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
By Jonathan Gohstand The increasingly global nature of business requires companies to collaborate more and more across borders, exchanging all manner of documents: contracts, engineering documents and other intellectual property, customer lists, marketing programs and materials, and so on. Unfortun ...
Posted 20 November 2013 by Cloud Security Alliance (CSA)
0
comments
The Cloud Vis-à-Vis Disclosure
By Punam Tiwari We may not realize we’re doing so, but we all use the “cloud”. E-mail services, such as Hotmail, are cloud-based, as is the data storage tool Dropbox. Corporates in a variety of industries are adopting cloud-based software and data storage, for example Salesforce, ...
Posted 19 November 2013 by IRM Plc
0
comments
By V.Jay LaRosa While listening to one of my favorite podcasts about two months ago, I heard a quote from a man named William Gibson that really resonated with me. He said, "The future is here already, it's just not evenly distributed". As I was driving along continuing to listen, it real ...
Posted 18 November 2013 by Cloud Security Alliance (CSA)
1
comment
A new Quocirca research report underlines the importance of application delivery controllers (ADCs) and the skills needed to deploy and manage them. So, what exactly is an ADC and where can you get one? ADCs are basically next-generation load balancers and are proving to be fundamental building blo ...
Posted 18 November 2013 by Bob Tarzey
0
comments
Jurassic DDoS?
Like something from the digital ice age, distributed denial-of-service (DDoS) attacks have thawed and are roaming the cyber planet again, according to data from Google in collaboration with Arbor Networks, which provides insight into the scale and geography of recent cyber strikes. Various othe ...
1
comment
By Gavin Hill Secure Shell (SSH) is the de facto protocol used by millions to authenticate to workloads running in the cloud and transfer data securely. Even more SSH sessions are established automatically between systems, allowing those systems to securely transfer data without human intervention. ...
Posted 30 October 2013 by Cloud Security Alliance (CSA)
0
comments
Talking Privacy with TRUSTe MD EMEA
At the RSA Europe conference in Amsterdam, I had the chance to meet the newly appointed MD EMEA at TRUSTe, a data privacy management company. With a background in the ad tech space, Ken Parnham, an instantly likeable ‘say it how it is’ type of guy explains his move to TRUSTe by telling ...
Posted 29 October 2013 by Eleanor Dallaway
0
comments
At the women of Bletchley Park event earlier this month, I met with Jane Wainwright, senior manager of cybersecurity at PwC and co-founder of the Women’s Security Society (co-organizer of the Bletchley Park event). Wainwright’s impressive CV includes the role of head of corporate securit ...
Posted 28 October 2013 by Eleanor Dallaway
1
comment
The Legalities of BYOD
By Punam Tiwari In-house lawyers everywhere are finding themselves being asked more and more to revise Bring Your Own Device policies (“BYOD”). This is a concept that has been around for a number of years, but which has recently gained ground within corporates, thanks to the popularity ...
Posted 28 October 2013 by IRM Plc
0
comments
When I was invited to attend a roundtable on ‘mobility’, hosted by Canon, I was in two minds. I kind of feel like I‘ve heard it all before when it comes to BYOD and security challenges around remote working. On the other hand, it’s still a topic which interests and challenges ...
Posted 28 October 2013 by Eleanor Dallaway
0
comments
By James Wootton I started to construct this opinion piece with the flame of righteous justice dancing over my sword of indignation, ready to smite another researcher not subscribing to established responsible disclosure procedures. These are individuals who throw scraps to the army of ‘scrip ...
Posted 21 October 2013 by IRM Plc
0
comments
Patching the Perpetual MD5 Vulnerability
By Gavin Hill Earlier this month, Microsoft updated the security advisory that deprecates the use of MD5 hash algorithms for certificates issued by certification authorities (CA) in the Microsoft root certificate program. The patch has been released so that administrators can test its impact before ...
Posted 18 October 2013 by Cloud Security Alliance (CSA)
0
comments
By Gavin Hill For years, cybercriminals have been taking advantage of the blind trust organizations and users place in cryptographic keys and digital certificates. Only now are vendors starting to respond to the use of keys and certificates as an attack vector. In late August, for example, Google ...
Posted 18 October 2013 by Cloud Security Alliance (CSA)
0
comments
Ten Years Gone (Editorial from Q4 2013)
A lot can happen in a decade, as the latest 10th anniversary issue of Infosecurity is testament to. Happy birthday to us! To celebrate ten years of Infosecurity magazine, we’ve put a spotlight on the acmes and evolution of the information security industry since 2003, when Infosecurity w ...
Posted 17 October 2013 by Eleanor Dallaway
0
comments
Are we as security practitioners willing to 'eat our own cooking'? In other words, are security professionals practicing what they preach with respect to compliance at the organizational security function level? A recently leaked US Office of the Inspector General (OIG) report pertaining to th ...
0
comments
This year’s Virus Bulletin conference, the ‘must-go-to’ event for most anti-malware researchers, was light on (directly) Mac-related content. Unsurprising perhaps: there has been no recent high-profile, high-volume malware event equivalent to the great Flashback Flashflood of 2012. ...
Posted 08 October 2013 by David Harley
1
comment
iPhoning It In
I’ve written before on the subject of smartphones, encryption, and data security.  And it’s probably fair to say that while smartphones have changed, my opinions haven’t. Then again, I’m rather set in my ways these days. So it’s obvious for users that don&rsq ...
Posted 07 October 2013 by Geoff Webb
0
comments
App-ropriate Security
By Trevor Boldon Over recent years mobile applications have become increasingly popular, and modern smartphones can now offer such an array of apps that it is often hard to imagine life without them. I myself am guilty of regularly using takeaway ordering apps a little too much, but the ease and co ...
Posted 01 October 2013 by IRM Plc
0
comments
By Harold Byun Cybercriminals are clever and know how to evolve – you’ve got to give them that. They’ve proven this once again with their latest cyber-attack strategy, the Watering Hole Attack, which leverages cloud services to help gain access to even the most secure and sophisti ...
Posted 23 September 2013 by Cloud Security Alliance (CSA)
0
comments
Securing Amazon Web Services
On September 17, 2013, Quocirca attended the Amazon Web Services (AWS) Enterprise Summit in London. The rate of growth of the vendor’s online infrastructure is remarkable if its own figures are to be believed. Using itself as a yardstick, AWS says it is adding enough new infrastructure a ...
Posted 20 September 2013 by Bob Tarzey
Showing 21 - 40 of 512 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×