Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
By Gavin Hill For years, cybercriminals have been taking advantage of the blind trust organizations and users place in cryptographic keys and digital certificates. Only now are vendors starting to respond to the use of keys and certificates as an attack vector. In late August, for example, Google ...
Posted 18 October 2013 by Cloud Security Alliance (CSA)
0
comments
Ten Years Gone (Editorial from Q4 2013)
A lot can happen in a decade, as the latest 10th anniversary issue of Infosecurity is testament to. Happy birthday to us! To celebrate ten years of Infosecurity magazine, we’ve put a spotlight on the acmes and evolution of the information security industry since 2003, when Infosecurity w ...
Posted 17 October 2013 by Eleanor Dallaway
0
comments
Are we as security practitioners willing to 'eat our own cooking'? In other words, are security professionals practicing what they preach with respect to compliance at the organizational security function level? A recently leaked US Office of the Inspector General (OIG) report pertaining to th ...
0
comments
This year’s Virus Bulletin conference, the ‘must-go-to’ event for most anti-malware researchers, was light on (directly) Mac-related content. Unsurprising perhaps: there has been no recent high-profile, high-volume malware event equivalent to the great Flashback Flashflood of 2012. ...
Posted 08 October 2013 by David Harley
1
comment
iPhoning It In
I’ve written before on the subject of smartphones, encryption, and data security.  And it’s probably fair to say that while smartphones have changed, my opinions haven’t. Then again, I’m rather set in my ways these days. So it’s obvious for users that don&rsq ...
Posted 07 October 2013 by Geoff Webb
0
comments
App-ropriate Security
By Trevor Boldon Over recent years mobile applications have become increasingly popular, and modern smartphones can now offer such an array of apps that it is often hard to imagine life without them. I myself am guilty of regularly using takeaway ordering apps a little too much, but the ease and co ...
Posted 01 October 2013 by IRM Plc
0
comments
By Harold Byun Cybercriminals are clever and know how to evolve – you’ve got to give them that. They’ve proven this once again with their latest cyber-attack strategy, the Watering Hole Attack, which leverages cloud services to help gain access to even the most secure and sophisti ...
Posted 23 September 2013 by Cloud Security Alliance (CSA)
0
comments
Securing Amazon Web Services
On September 17, 2013, Quocirca attended the Amazon Web Services (AWS) Enterprise Summit in London. The rate of growth of the vendor’s online infrastructure is remarkable if its own figures are to be believed. Using itself as a yardstick, AWS says it is adding enough new infrastructure a ...
Posted 20 September 2013 by Bob Tarzey
0
comments
By Charles White I've been fortunate enough to have attended most of the briefings provided by the Foreign and Commonwealth Office, Department for Business Innovation and Skills and the Security Service on keeping the UK safe in cyber space. What has been stark in all these presentations is that t ...
Posted 06 September 2013 by IRM Plc
0
comments
Network Access Control in the Real World
Quocirca research shows that the two biggest concerns organisations have when considering the use of cloud-based services are the safety of personal data and complying with the data protection laws (see free Quocirca report, 'The Adoption of Cloud-based Services'). The report shows that these are is ...
Posted 05 September 2013 by Bob Tarzey
1
comment
By Kamal Shah Given the recent influx of cybersecurity attacks and the hubbub about the National Security Agency’s PRISM program, there is lot of talk about the importance of encryption to protect corporate data in the cloud. (PRISM is a clandestine data mining operation authorized by the US ...
Posted 03 September 2013 by Cloud Security Alliance (CSA)
0
comments
Child Porn Under the Carpet
UK culture secretary Maria Miller has held a summit with the world’s biggest ISPs to discuss the proliferation of child pornography and graphic images of child abuse online. "Child abuse images are horrific and widespread public concern has made it clear that the industry must take action ...
Posted 29 August 2013 by Jean-Loup Richet
0
comments
The Sound of Fear
When I read this story on CNBC about a hacker attempting (and thankfully failing) to verbally abuse a toddler through a hacked baby monitor, it did make me think that this was one of the oddest things I’ve heard about someone hacking.  Of course, when it comes to the world of the bizarre ...
Posted 28 August 2013 by Geoff Webb
0
comments
Aviation Info Sec
 By Sam Raynor For many years, the view of cybersecurity has lain squarely in the domains of the military; of state-sponsored espionage; or of the bedroom hacker who has nothing better to do than deface the page you are looking at. While these stereotypes do, undoubtedly, exist within the rea ...
Posted 21 August 2013 by IRM Plc
0
comments
By Kamal Shah Cloud services are here to stay, and practically everybody is embracing them. In fact, the cloud computing industry is growing at the torrid pace of nearly 30% per year right now, according to Pike Research. Certainly healthcare service providers are getting on the cloud services ban ...
Posted 14 August 2013 by Cloud Security Alliance (CSA)
0
comments
I Heart NYC
NYC and I have been ‘on a break’ for the last few years. It wasn’t Manhattan, it was me. We didn’t fall out, as such. Perhaps it was a case of too much too soon – after my very first visit to the city in 2008, I visited several times within a two-year period. Like at th ...
Posted 13 August 2013 by Eleanor Dallaway
0
comments
Regulatory Pain
By Sean Arrowsmith Increasingly I am witnessing my clients' utter frustration, endless despair, abject misery…cue the violins…. This gloom and doom is due to the ever-increasing compliance and regulatory burden they need to address in order to continue to do business. So many bu ...
Posted 09 August 2013 by IRM Plc
0
comments
Business Social Media Security
By Mark Crowther Recent takeovers of prominent organization's social media accounts by the Syrian Electronic Army raise concerns (once again) over the impact protest groups have with the rise of 'hacktivism'. The Pro Assad Syrian Electronic Army has successfully targeted a number of Western, predom ...
Posted 05 August 2013 by IRM Plc
0
comments
The Black Hat 2013 keynote, presented by General Alexander, director of the NSA, was potentially the most highly-anticipated talks I’ve been to in my seven years in this industry. I’m not being overly-dramatic when I say you could literally feel the tension in the room as Black Hat&rsquo ...
Posted 05 August 2013 by Eleanor Dallaway
0
comments
First a disclaimer: This blog has absolutely nothing to do with information security. This blog is about Las Vegas, with the only link to infosec being that it was for Black Hat and BSides Vegas that I’ve spent the last four days in Sin City… So, Vegas. Vegas is one of the most exciti ...
Posted 02 August 2013 by Eleanor Dallaway
Showing 41 - 60 of 520 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×