Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
Securing Amazon Web Services
On September 17, 2013, Quocirca attended the Amazon Web Services (AWS) Enterprise Summit in London. The rate of growth of the vendor’s online infrastructure is remarkable if its own figures are to be believed. Using itself as a yardstick, AWS says it is adding enough new infrastructure a ...
Posted 20 September 2013 by Bob Tarzey
0
comments
By Charles White I've been fortunate enough to have attended most of the briefings provided by the Foreign and Commonwealth Office, Department for Business Innovation and Skills and the Security Service on keeping the UK safe in cyber space. What has been stark in all these presentations is that t ...
Posted 06 September 2013 by IRM Plc
0
comments
Network Access Control in the Real World
Quocirca research shows that the two biggest concerns organisations have when considering the use of cloud-based services are the safety of personal data and complying with the data protection laws (see free Quocirca report, 'The Adoption of Cloud-based Services'). The report shows that these are is ...
Posted 05 September 2013 by Bob Tarzey
1
comment
By Kamal Shah Given the recent influx of cybersecurity attacks and the hubbub about the National Security Agency’s PRISM program, there is lot of talk about the importance of encryption to protect corporate data in the cloud. (PRISM is a clandestine data mining operation authorized by the US ...
Posted 03 September 2013 by Cloud Security Alliance (CSA)
0
comments
Child Porn Under the Carpet
UK culture secretary Maria Miller has held a summit with the world’s biggest ISPs to discuss the proliferation of child pornography and graphic images of child abuse online. "Child abuse images are horrific and widespread public concern has made it clear that the industry must take action ...
Posted 29 August 2013 by Jean-Loup Richet
0
comments
The Sound of Fear
When I read this story on CNBC about a hacker attempting (and thankfully failing) to verbally abuse a toddler through a hacked baby monitor, it did make me think that this was one of the oddest things I’ve heard about someone hacking.  Of course, when it comes to the world of the bizarre ...
Posted 28 August 2013 by Geoff Webb
0
comments
Aviation Info Sec
 By Sam Raynor For many years, the view of cybersecurity has lain squarely in the domains of the military; of state-sponsored espionage; or of the bedroom hacker who has nothing better to do than deface the page you are looking at. While these stereotypes do, undoubtedly, exist within the rea ...
Posted 21 August 2013 by IRM Plc
0
comments
By Kamal Shah Cloud services are here to stay, and practically everybody is embracing them. In fact, the cloud computing industry is growing at the torrid pace of nearly 30% per year right now, according to Pike Research. Certainly healthcare service providers are getting on the cloud services ban ...
Posted 14 August 2013 by Cloud Security Alliance (CSA)
0
comments
I Heart NYC
NYC and I have been ‘on a break’ for the last few years. It wasn’t Manhattan, it was me. We didn’t fall out, as such. Perhaps it was a case of too much too soon – after my very first visit to the city in 2008, I visited several times within a two-year period. Like at th ...
Posted 13 August 2013 by Eleanor Dallaway
0
comments
Regulatory Pain
By Sean Arrowsmith Increasingly I am witnessing my clients' utter frustration, endless despair, abject misery…cue the violins…. This gloom and doom is due to the ever-increasing compliance and regulatory burden they need to address in order to continue to do business. So many bu ...
Posted 09 August 2013 by IRM Plc
0
comments
Business Social Media Security
By Mark Crowther Recent takeovers of prominent organization's social media accounts by the Syrian Electronic Army raise concerns (once again) over the impact protest groups have with the rise of 'hacktivism'. The Pro Assad Syrian Electronic Army has successfully targeted a number of Western, predom ...
Posted 05 August 2013 by IRM Plc
0
comments
The Black Hat 2013 keynote, presented by General Alexander, director of the NSA, was potentially the most highly-anticipated talks I’ve been to in my seven years in this industry. I’m not being overly-dramatic when I say you could literally feel the tension in the room as Black Hat&rsquo ...
Posted 05 August 2013 by Eleanor Dallaway
0
comments
First a disclaimer: This blog has absolutely nothing to do with information security. This blog is about Las Vegas, with the only link to infosec being that it was for Black Hat and BSides Vegas that I’ve spent the last four days in Sin City… So, Vegas. Vegas is one of the most exciti ...
Posted 02 August 2013 by Eleanor Dallaway
1
comment
My Editorial: Q3 issue: Lost For Words
When my deputy Drew ‘shotgunned’ the Snowden story for his editorial, I thought we could perhaps both tackle the captivating case, in a similar showdown to that of the Point Counterpoint opinion pieces. Having shared our thoughts on the controversy, however, we realized our opinions are ...
Posted 23 July 2013 by Eleanor Dallaway
0
comments
Software Development Lifecycle
By Sean Arrowsmith I’ve recently been working closely with a couple of our key clients – one a large financial services company and the other a large broadcast media firm. It has been really encouraging to see that they are now focusing on security in the software development lifecycle. ...
Posted 22 July 2013 by IRM Plc
0
comments
Jerome Segura has blogged for Malwarebytes about a ransomware attack of sorts that poses a potential problem for OS X users. We’ve become all too familiar with malware that targets Windows users, telling them they have to pay the FBI or the police a fine for some infraction, often involving po ...
Posted 17 July 2013 by David Harley
1
comment
 Is Edward Snowden a hero, or a criminal? Is he a champion of human rights, or a traitor to his country? These are complicated questions, but I wonder if we should be asking them at all. As I write this, Snowden is marooned in the transit zone of a Moscow airport – the victim of a revoke ...
Posted 10 July 2013 by Drew Amorosi
0
comments
Mac Phisheries
I recently came across a Kaspersky report – Apple of Discord – by Nadezhda Demidova. Primarily, it’s about a dramatic rise in phishing attacks directed at those of us who use Apple devices (presumably including Macs as well as iOS iGadgets). According to the report, Kaspe ...
Posted 10 July 2013 by David Harley
0
comments
By Sean Arrowmith Over the last week or so I have been working with colleagues and some of our specialist partners on putting together a presentation to an industry special interest group. One of the aforementioned presentations looked at hardware security and the potential for hidden threats at th ...
Posted 10 July 2013 by IRM Plc
0
comments
At the recent IT Security Analysts Forum in London, organised by Eskenzi PR, one could be forgiven for thinking that the dozen or so vendors represented were all fierce competitors. Their high-level taglines all sounded pretty similar; “we secure your business’s data”, “our p ...
Posted 10 July 2013 by Bob Tarzey
Showing 41 - 60 of 513 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×