Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
Application-Aware Firewalls
By Andy Thurai You may have heard this term recently and wondered what it meant. When it comes to security, everyone thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email security and even Web security, but most people don’t think in terms of application level security unless ...
Posted 09 August 2012 by Cloud Security Alliance (CSA)
0
comments
Most IT users will have suffered the frustration of losing work because their access device (PC, tablet, smartphone etc.) fails and has not been backed up, or indeed they may have deleted a file accidentally. This is inconvenient for the individual and those associated with the project they are work ...
Posted 16 April 2012 by Bob Tarzey
0
comments
Don’t Forget the Network
A recent news story in New Scientist reminds us how important the speed of network communications has become for some organisations: ….cable company Hibernia Atlantic is spending $300 million to build a new transatlantic cable to shave 6 milliseconds from the present 65-millisecond transit ...
Posted 21 October 2011 by Bob Tarzey
0
comments
Not with a Bang, but a Whimper
The high-profile security conference season is usually enlivened with a few Mac attacks, Apple app attacks, and other euphonious assonances. While the most consistent source of such diversions is probably CanSecWest, BlackHat and Defcon often have some interesting harvesting from the Apple orchard t ...
Posted 10 August 2011 by David Harley
0
comments
SEC and the Porn Farm
  Thirty-three people at the SEC were found to have been looking at porn at work over the past five years according the a summary of internal probes conducted by the SEC’s inspector general and reported by the Wall Street Journal and eSoft.   Without imposing my social norms, it's ...
Posted 10 March 2011 by Rick Robinson
0
comments
Buying the Security Farm
The landscape of network security is a world of transition. However, one thing we know for certain is that the threats are becoming more organized, more advanced, and more focused on obtaining one thing: information the attacker can sell. What do they want? Anything that personally identifies ...
Posted 02 February 2011 by Rick Robinson
Showing 1 - 6 of 6 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×