Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
My Apology Letter to Edward Snowden
Nine months and counting – nine months since Edward Snowden first told the world that the US government logged the metadata of all telephone traffic. Shortly after came PRISM, involvement by the UK government’s GCHQ, and XKeyscore. We’ve learned that the NSA monitored communication ...
Posted 17 March 2014 by Drew Amorosi
0
comments
By V.Jay LaRosa While listening to one of my favorite podcasts about two months ago, I heard a quote from a man named William Gibson that really resonated with me. He said, "The future is here already, it's just not evenly distributed". As I was driving along continuing to listen, it real ...
Posted 18 November 2013 by Cloud Security Alliance (CSA)
0
comments
Talking Privacy with TRUSTe MD EMEA
At the RSA Europe conference in Amsterdam, I had the chance to meet the newly appointed MD EMEA at TRUSTe, a data privacy management company. With a background in the ad tech space, Ken Parnham, an instantly likeable ‘say it how it is’ type of guy explains his move to TRUSTe by telling ...
Posted 29 October 2013 by Eleanor Dallaway
1
comment
My Editorial: Q3 issue: Lost For Words
When my deputy Drew ‘shotgunned’ the Snowden story for his editorial, I thought we could perhaps both tackle the captivating case, in a similar showdown to that of the Point Counterpoint opinion pieces. Having shared our thoughts on the controversy, however, we realized our opinions are ...
Posted 23 July 2013 by Eleanor Dallaway
0
comments
By David Canellos While the Internet of Things is not a new concept (Kevin Ashton first coined the term in 1999 to describe how the internet is connected to the physical world), it is just now becoming a reality due to some major shifts in technology. According to ABI Research, more than 5B wirele ...
Posted 05 June 2013 by Cloud Security Alliance (CSA)
0
comments
I attended the ISSA European Conference last week, and was pleasantly surprised by a fantastic speaker line-up and some excellent content. The agenda was kicked off by Right Honourable David Davis, MP House of Commons, UK Parliament, who joked that his talk would completely defy that of what was ou ...
Posted 14 February 2013 by Eleanor Dallaway
0
comments
  In an interesting addition to the everlasting debate about internet censorship – specifically on the idea of an 'Internet Tax' – one of the creators of the internet has spoken out about his views on how strange the notion is, and how the interference of governments in managing hi ...
Posted 11 February 2013 by Jean-Loup Richet
4
comments
2013: The Year for Privacy?
As we approach the end of the year it is only natural that people start looking forward to what may happen in the upcoming New Year. My inbox, like everyone else’s, has been flooded with messages from vendors predicting the threats that we will face in 2013, and by some strange twist of fate o ...
Posted 18 December 2012 by Brian Honan
0
comments
First, please excuse me for letting my inner Archie Bunker vent a little. If you are anything like me, then you could care less about updating your Facebook page on an hourly basis. Sure, I have a page, but maintaining it is both a bore and a chore (pardon my weak rhyming scheme). What are even wors ...
Posted 02 February 2012 by Drew Amorosi
0
comments
Google recently announced an approach to provide Wi-Fi Access Point owners an option to opt-out from the Google Location server, thereby addressing specific privacy concerns of certain Access Point owners, and of the users in the coverage area of specific Access Point(s). Location based services ( ...
Posted 20 November 2011 by Ajay Gupta
0
comments
In a recently released report titled “Wi-Fi Positioning Systems: Beware of Unintended Consequences”  – by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, and Kim Cameron, a leading digital identity expert – indicates that availability of mobile device ...
Posted 16 June 2011 by Ajay Gupta
0
comments
Revisiting Data Privacy Day
We regret that we did not have space to publish this in our upcoming print edition, but we here at Infosecurity nonetheless thought it was important to provide our readers with this feedback we received recently on one of our web news items. Since it is in reference to an online item, we thought we ...
Posted 28 March 2011 by Drew Amorosi
0
comments
You know that I am not a big fan of the requirement for having all Internet users authenticate strongly. There are people in the security arena who think that this is the only way to fight cybercrime – and in parallel accept that they would kill freedom of speech. I recently had a good discus ...
Posted 17 March 2010 by Roger Halbheer
0
comments
Data Protection Day: An Interesting Study
As you might know, it was time for the Data Protection Day in Europe again. Unfortunately I did not find the videos from this year’s competition, yet but I guess we will find them later on the page and on YouTube. However, we released a study on Privacy that is pretty interesting. Find t ...
Posted 29 January 2010 by Roger Halbheer
0
comments
When I entered the US this time, I got a brochure on how I could avoid the line at immigration and just get a fast track by registering with the Global Entry Program, a programme, which would pre-screen me and then I just have to register with a machine by entering the US. As I understand, this is a ...
Posted 30 September 2009 by Roger Halbheer
Showing 1 - 15 of 15 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×