Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

1
comment
How Do You Define a Data Breach?
As I have promised in previous posts, I will continue to use this space to publish comments and letters we receive on our coverage. This most recent comment came from someone read our news item a few weeks ago about the recent spearphishing attack on the White House. Our reader noted: "Infos ...
Posted 19 October 2012 by Drew Amorosi
0
comments
What exactly constitutes a data breach? How do we define it? Is it simply when an attacker runs off with thousands of customer details, or does it also include the theft of IP? Perhaps it’s any action that leads to the compromise of organizational data, networks, or assets? What about when our ...
Posted 09 October 2012 by Drew Amorosi
0
comments
Debunking the Gospel of Security Marketing
Identity and access management are critical for most, if not all organizations – whether its employee access to enterprise networks, or customers who need access to your products and services. Authentication – and the credentials that make it possible – is at the heart of many data ...
Posted 27 August 2012 by Drew Amorosi
0
comments
Betting on a Breach
In February of this year, the University of North Carolina-Charlotte issued a statement that a breach had occurred. It now seems to have been a serious one.  As of the statement on May 9th (.pdf), it looks as though more than 350,000 social security numbers (along with other personal detai ...
Posted 14 May 2012 by Geoff Webb
0
comments
Consumers Say No (to data leaks)
A recent Quocirca blog post pointed out there were good business reasons for disclosing data breaches as well as an increasing number of regulatory ones. For those organisations not convinced by these arguments and still intent on attempting to brush leaks under the carpet, there is new evidence tha ...
Posted 25 October 2011 by Bob Tarzey
0
comments
Responsible Data Leak Disclosure
There has been plenty written, not least by Quocirca, on the danger of data loss and how to prevent it. Less has been said about how to clear up afterwards; when the measures taken to protect a business from such losses have failed or were not present in the first place. In particular the responsibi ...
Posted 16 September 2011 by Bob Tarzey
0
comments
The Cost of a Data Breach
As I have done in a previous post, I am taking this opportunity to share with our online audience some of the letters we receive regarding our online and print coverage. This letter comes from a reader of our most recent issue, and my response to his comments can be found below the letter. As always ...
Posted 08 July 2011 by Drew Amorosi
0
comments
Often when I chat with people within the industry, the one thing I expect is a consistent message akin to a broken record. De-perimiterization, consumerization, defense in depth – the list of things I hear brought up in nearly every conversation is as fine tuned as a political candidate&rsqu ...
Posted 23 June 2011 by Drew Amorosi
0
comments
On First Base with Stolen Email Addresses
CNN continues to report on the compromise of email addresses and names from Epsilon systems over the weekend and the potential impact it may have on net citizens. There is fear and uncertainty that comes with any compromise, but it is important to understand where this activity sits in the process o ...
Posted 04 April 2011 by Rick Robinson
4
comments
HITECH, breaches, and a little sunlight
A good article in InfoSecurity on May 5th on the HITECH act got me thinking (as good articles should) about health records, security, and well, all things HIPAA-ish. I certainly agree with much of what was said, and I think it’s clear that the pressure is ramping up rapidly to not only comply ...
Posted 13 May 2010 by Geoff Webb
Showing 1 - 10 of 10 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×