Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
The encryption vendor SafeNet publishes a Breach Level Index that records actual reported incidents of data loss. While the number of losses attributed to malicious outsiders (58%) exceeds those attributed to malicious insiders (13%), SafeNet claims that insiders account for more than half of t ...
Posted 16 July 2014 by Bob Tarzey
0
comments
Fight the Power
It was during an interview at Infosecurity Europe when my interviewee said to me “Every single vendor in this exhibition hall does exactly the same thing” when I realized that I’m actually quite protective about our industry’s vendor community. The man, who I won’t name ...
Posted 07 July 2014 by Eleanor Dallaway
0
comments
At this year’s Infosecurity Europe conference and exhibition, held at London’s Earls Court, senior figures from both government and industry called for greater collaboration on how security intelligence is shared, in order to protect against cyber-attacks and ensure that security insight ...
Posted 22 May 2014 by Victoria Windsor
0
comments
“Heartbleed could have been prevented”, Vidhya Ranganathan, Accellion’s SVP of security, told me at Infosecurity Europe 2014. These are words that I’d be hearing several times over my three day ‘staycation’ in Earl’s Court at the end of April. Don’t g ...
Posted 20 May 2014 by Eleanor Dallaway
0
comments
Interview: Chris Boyd, aka @paperghost
Chris Boyd is a malware intelligence anaylst at Malwarebytes. You might know him better by his previous roles at FaceTime, GFI, ThreatTrack or as @paperghost. Despite his deeply technical knowledge, Boyd is a brilliant communicator, and is able to talk about incredibly technical things in a relativ ...
Posted 19 May 2014 by Eleanor Dallaway
0
comments
Supply Chain: Friend or Foe?
By Massimo Cotrozzi It is now commonplace for large companies, and even SMEs, to have in place a number of IT interfaces with suppliers, partners and contractors. Some may provide one-off services and for others, there may be an ongoing relationship. For example, the purchasing department of o ...
Posted 08 May 2014 by Ernst and Young LLP
0
comments
As the web has evolved, so have the security products and services that control our use of it. In the early days of the “static web” it was enough to tell us which URLs to avoid because the content was undesirable (porn, etc.) As the web became a means distributing malware and perpetrati ...
Posted 28 April 2014 by Bob Tarzey
0
comments
By Mark Brown Much has been made of Microsoft’s decision to stop security support for Windows XP over the last few weeks. Some commentators have likened it to something of a Y2K-esque tech apocalypse with fears of a field day for hackers and cybercriminals, and others have derided the doom-m ...
Posted 16 April 2014 by Ernst and Young LLP
0
comments
A Legal Perspective on Big Data
By Punam Tiwari On my return home from my Cheltenham Head Office one evening, I happened upon an opinon article quite randomly lying around in the train by David Aaronovitch of The Times, titled “Privacy activists don’t speak for most of us”. The article dealt with Google&rsq ...
Posted 14 April 2014 by IRM Plc
0
comments
It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for three reasons: first, better code is likely to be released in the first place; second, it will be le ...
Posted 21 March 2014 by Bob Tarzey
0
comments
Convergence of SIEM and Forensics
Sometimes technology areas that once seem distinct converge. Indeed, there was a time when the term convergence was used, without qualification, to refer to the coming together of IT and traditional telephone networks, something that for many is now just an accepted reality. During two recent discu ...
Posted 10 March 2014 by Bob Tarzey
0
comments
The protection of personal data has been back in the news in the UK over the last month due to the government bungling plans to make anonymized NHS patient data available for research. The scheme gives NHS patients the option to opt-out of sharing their data: why? NHS care in the UK is mostly provid ...
Posted 10 March 2014 by Bob Tarzey
0
comments
Here’s a dull-sounding question: Imagine a world without SSL (secure sockets layer) or its successor TLS (transport layer security)? A security tech-head may find the whole thing quite interesting, but for the average IT user, despite relying on SSL day-in, day-out, it will not arouse much exc ...
Posted 03 March 2014 by Bob Tarzey
0
comments
By Jack Buckle Technology plays such a critical role in organizations, and their consequent environmental threats are numerous and dynamic. In light of this, how can your business proactively maximize cybersecurity, as opposed to approaching it in a reactive manner? It’s a cliché, b ...
Posted 25 February 2014 by IRM Plc
0
comments
Let’s Stay Together
The information security industry is at war – with itself. A civil war occurring simultaneously with the more widely publicized war against cybercrime, and whatever and whomever threatens the security of information. Consensus says that defense is almost always at a disadvantage, of which inf ...
Posted 11 February 2014 by Eleanor Dallaway
0
comments
At this year’s Governing Outlook in the States & Localities conference, a panel of chief information security officers (CISOs) from state and local governments addressed the topic: “CYBER SECURITY: One of the Nation’s Most Serious Challenges.” Participants provided insigh ...
0
comments
Why Would they DoS Us?
As various pundits have reeled off their security advice for 2014, many have listed the growing threat of denial-of-service (DoS) attacks as something to look out for. They are probably right to do so; two recent publications, the Arbor Worldwide Infrastructure Security Report (WISR) and the Prolexi ...
Posted 10 February 2014 by Bob Tarzey
0
comments
Social Media in the Workplace
By Punam Tiwari The security issues of social media use in the workplace has been written about extensively, and yet it still enjoys as relevant a place in the work context now as it did previously. We all work longer hours these days in comparison to our parents’ generations, and it strikes ...
Posted 23 January 2014 by IRM Plc
0
comments
By Dan Dagnall Federation is definitely a hot topic these days, with NSTIC attempting to create an identity ecosystem, InCommon continuing to build its service-provider federation, and state-level initiatives gearing up (some are already operational) to provide federated identity services to four-y ...
Posted 09 January 2014 by Cloud Security Alliance (CSA)
0
comments
By Phil Mason In the following post I will discuss ‘Progress against the Objectives of the National Cyber Security Strategy’, ‘Forward Plans’ and a few of my own predictions on what 2014 may hold for the world of cyber. Progress Is a Nice Word Rather encouragingly, much ha ...
Posted 09 January 2014 by IRM Plc
Showing 1 - 20 of 492 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×