Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
At this year’s Infosecurity Europe conference and exhibition, held at London’s Earls Court, senior figures from both government and industry called for greater collaboration on how security intelligence is shared, in order to protect against cyber-attacks and ensure that security insight ...
Posted 22 May 2014 by Victoria Windsor
0
comments
Interview: Chris Boyd, aka @paperghost
Chris Boyd is a malware intelligence anaylst at Malwarebytes. You might know him better by his previous roles at FaceTime, GFI, ThreatTrack or as @paperghost. Despite his deeply technical knowledge, Boyd is a brilliant communicator, and is able to talk about incredibly technical things in a relativ ...
Posted 19 May 2014 by Eleanor Dallaway
0
comments
By Jack Buckle Technology plays such a critical role in organizations, and their consequent environmental threats are numerous and dynamic. In light of this, how can your business proactively maximize cybersecurity, as opposed to approaching it in a reactive manner? It’s a cliché, b ...
Posted 25 February 2014 by IRM Plc
0
comments
At this year’s Governing Outlook in the States & Localities conference, a panel of chief information security officers (CISOs) from state and local governments addressed the topic: “CYBER SECURITY: One of the Nation’s Most Serious Challenges.” Participants provided insigh ...
0
comments
Social Media in the Workplace
By Punam Tiwari The security issues of social media use in the workplace has been written about extensively, and yet it still enjoys as relevant a place in the work context now as it did previously. We all work longer hours these days in comparison to our parents’ generations, and it strikes ...
Posted 23 January 2014 by IRM Plc
0
comments
The Cloud Vis-à-Vis Disclosure
By Punam Tiwari We may not realize we’re doing so, but we all use the “cloud”. E-mail services, such as Hotmail, are cloud-based, as is the data storage tool Dropbox. Corporates in a variety of industries are adopting cloud-based software and data storage, for example Salesforce, ...
Posted 19 November 2013 by IRM Plc
0
comments
By Charles White I've been fortunate enough to have attended most of the briefings provided by the Foreign and Commonwealth Office, Department for Business Innovation and Skills and the Security Service on keeping the UK safe in cyber space. What has been stark in all these presentations is that t ...
Posted 06 September 2013 by IRM Plc
0
comments
Shortly before the chaos of Infosecurity Europe, I joined David Emm, senior security researcher at Kaspersky Lab, for lunch in a lovely quiet gastro pub in the Oxfordshire countryside. Whilst I frequently publish Emm’s quotes and photos in the magazine, we both agreed that this was most likel ...
Posted 03 May 2013 by Eleanor Dallaway
0
comments
At War with the World
In February, security firm Mandiant made headlines when they declared the hacking team APT1, “likely government-sponsored and one of the most persistent of China’s cyber threat actors”. China denied the involvement. Reuters reported that Hong Lei of the Chinese Foreign Ministry re ...
Posted 18 April 2013 by Eleanor Dallaway
0
comments
With sequestration cuts underway across the federal government, and the plight of the federal information security workforce being traditionally viewed as non-mission essential, one can only hope that the historically underfunded budgets of the federal CISO will survive the carving knives of the seq ...
0
comments
Finally, a Step Forward in Cybersecurity
0 0 1 502 2784 Extension Group 48 7 3279 14.0 Normal 0 false false false EN-US JA X-NONE ...
0
comments
  Going back as far as 2007, the (ISC)² Government Advisory Board (GAB) along with the ISSA-Northern Virginia Chapter Board, have been attempting to develop partnerships with veterans’ organizations in an effort to support veterans transitioning to a civilian career in informat ...
0
comments
During a speech in June 2012, Jonathan Evans, the chief of the UK’s home security agency MI5, stated that it was “fighting 'astonishing' levels of cyber-attacks”. The worry is not just about the number, but the sophistication and the degree of targeting of individual people and org ...
Posted 14 August 2012 by Bob Tarzey
0
comments
By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB)   The title of a recent InformationWeek article, “Skills Shortage? Quit Whining” caught our attention. In the article, the author highlights data from a recent Deloitte Consulting survey, which report ...
0
comments
By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB) It takes many, many years for a business area of focus to emerge as a recognized profession. Certainly, cybersecurity is moving in that direction. How does one know? When the US government launches an initiative like t ...
0
comments
  A UK Cyber Security Strategy has just been released by the Cabinet Office. The first thing I noted was that seven of its 43 pages are have a solid colour background but are otherwise blank – that's 16% completely wasted space. But as I read on I gradually came to the conclusion th ...
Posted 29 November 2011 by Mike Barwise
0
comments
So, What Makes You a Cyber ‘Expert’?
By the (ISC)² U.S. Government Advisory Board Executive Writers Bureau (EWB)   How many cybersecurity practitioners have had a colleague either in information technology (IT), or worse yet, from an unrelated field, offer advice on security matters and insist that they are a cybersecur ...
0
comments
A recent Washington Post article, “The great jobs mismatch”, points out that structural unemployment is caused by a mismatch between types of positions available and those who have the wrong skill sets to meet them. The information technology area, particularly information security, has ...
0
comments
While the Federal Government shutdown was averted thanks to some last-minute political gerrymandering and concessions by both sides of the aisle, it’s quite instructive to reflect on the implications of shutdown on the federal cybersecurity workforce, including contracts and contractors. More ...
0
comments
Cybersecurity: The Road Ahead
This paper by the Geneva Centre for the Democratic Control of Armed Forces (DCAF) was just brought to my attention. A piece of work that is definitely worth reading through. It lays out the problem space and then does a deep dive into the different sections: Governments Legislative Bo ...
Posted 14 April 2011 by Roger Halbheer
Showing 1 - 20 of 23 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×