Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
Aviation Info Sec
 By Sam Raynor For many years, the view of cybersecurity has lain squarely in the domains of the military; of state-sponsored espionage; or of the bedroom hacker who has nothing better to do than deface the page you are looking at. While these stereotypes do, undoubtedly, exist within the rea ...
Posted 21 August 2013 by IRM Plc
1
comment
My Editorial: Q3 issue: Lost For Words
When my deputy Drew ‘shotgunned’ the Snowden story for his editorial, I thought we could perhaps both tackle the captivating case, in a similar showdown to that of the Point Counterpoint opinion pieces. Having shared our thoughts on the controversy, however, we realized our opinions are ...
Posted 23 July 2013 by Eleanor Dallaway
0
comments
Shortly before the chaos of Infosecurity Europe, I joined David Emm, senior security researcher at Kaspersky Lab, for lunch in a lovely quiet gastro pub in the Oxfordshire countryside. Whilst I frequently publish Emm’s quotes and photos in the magazine, we both agreed that this was most likel ...
Posted 03 May 2013 by Eleanor Dallaway
1
comment
A Little too Much Access, Thank You
So now that it appears the Internet Apocalypse is over and we can all return to life as we know it, (assuming we ever left ) then our weary eyes can turn once more to the ever-fresh subject of cloud security. The recent angst and horror over in Washington (state) suggests that regardless of wh ...
Posted 29 March 2013 by Geoff Webb
0
comments
Mayan Hangover
It’s not often that having a background in both archeology and technology seems useful, but when you’re facing the end-of-the-world-as-we-know-it, then it’s surprising what becomes relevant. On Dec 21st, the 13th b'ak'tun in the Mayan calendar comes to an end and the following day ...
Posted 18 December 2012 by Geoff Webb
4
comments
2013: The Year for Privacy?
As we approach the end of the year it is only natural that people start looking forward to what may happen in the upcoming New Year. My inbox, like everyone else’s, has been flooded with messages from vendors predicting the threats that we will face in 2013, and by some strange twist of fate o ...
Posted 18 December 2012 by Brian Honan
1
comment
It’s a Man’s Man’s World
 So, I should probably begin with a disclaimer. I am a woman working in the infosecurity industry, which arguably makes me biased, but certainly puts me in a position to comment on this much-debated topic: the lack of women in information security. At the RSA Europe conference in October 2012, ...
Posted 10 December 2012 by Eleanor Dallaway
0
comments
A chat with Wolfgang Kandek, CTO, Qualys…
On November 8th, I attended the Qualys Security Conference 2012 at the Berkeley hotel in London. At the end of the day, I was lucky enough to catch up with Wolfgang Kandek, CTO of Qualys. The Future of Technology We talked about the future of technology and what it will mean for the security indu ...
Posted 26 November 2012 by Eleanor Dallaway
0
comments
Mobility, Cloud, and Elephants
So the common response on how to handle big problems has always been the old adage of how to eat an elephant – one bite at a time. For most problems (and I presume, pachyderm gastronomes too) this seems to work well. However, we’re facing a set of challenges for which that wisdom may no ...
Posted 16 November 2012 by Geoff Webb
0
comments
Risking It All
Ray Bradbury said “Living at risk is jumping off the cliff and building your wings on the way down.” It’s hard to imagine a better analogy for the challenges that information security faces today. Whether we want to or not, the business drive to adopt disruptive technologies and n ...
Posted 09 October 2012 by Geoff Webb
3
comments
  Even after the world has witnessed major Wi-Fi security incidents, such as Google’s Wi-Fi snooping controversy, a recent survey has indicated that WEP based Wi-Fi networks are still operational in large numbers, even though, WEP, at present, is widely understood as an easily broken sec ...
Posted 07 September 2012 by Ajay Gupta
0
comments
The Weakest LinkedIn
If you missed the news (and I bet you didn’t) then here it is – LinkedIn recently had its very own digital moment of truth, when hackers stole around 6 million passwords. Well, if not actual passwords, then the SHA-1 hashes for passwords. And, to make matters worse, the thieves the ...
Posted 18 June 2012 by Geoff Webb
0
comments
Configuration Compliance in the Cloud
By David Meltzer As a member solution provider in the Cloud Security Alliance, paying careful attention to risk and planning for improvement is second nature for my own companies’ security services. As a consumer of many start-up cloud services built completely outside the security industry, ...
Posted 25 April 2012 by Cloud Security Alliance (CSA)
0
comments
Pining for Failure in the Cloud
I missed this info-graphic first time around, so thanks to securecloudreview.com for posting a link.   Like all info-graphics, it makes the process of digesting rather stodgy numbers much more enjoyable. Kind of like a good glass of wine. Or custard, with a jam roly-poly (for those with f ...
Posted 18 April 2012 by Geoff Webb
0
comments
By Andrew Wild It’s clear there are many compelling reasons, both financial and productivity-related, for enterprises to move IT functionality into the cloud, so it’s not surprising that they’re moving quickly to adopt popular collaboration services like Box.net, Yammer, Jive, and ...
Posted 13 April 2012 by Cloud Security Alliance (CSA)
0
comments
  Recently HTC acknowledged a vulnerability that can expose a user’s WiFi credentials, including the WiFi SSID and security passwords to a malicious app running on some of its Android phones. The vulnerability was discovered by the security architects Chris Hessing and Bret Jordan, and i ...
Posted 03 February 2012 by Ajay Gupta
0
comments
Casablanca in the Cloud
I thought this piece by Jo Maitland over at SearchCloudComputing.com was interesting, because it so closely reflects the experiences of a large number of businesses faced with the specter of uncontrolled cloud usage. Indeed, the story is an old, familiar one: Girl meets cloud. Girl ...
Posted 11 January 2012 by Geoff Webb
0
comments
Enabling WPS Can Make You Vulnerable
Adding to the users convenience, Wi-Fi is increasingly becoming a default capability of many consumer devices, including smartphones, printers, cameras, TVs, etc. to wirelessly share contents, access Internet or connect to a particular network.   However, configuring the correct Wi-Fi settings ...
Posted 29 December 2011 by Ajay Gupta
0
comments
Cloud Security Considerations
By Ken Biery Can a cloud be as secure as a traditional network? In a word, yes! I agree that some may find this statement surprising. Depending on the network, that may be a low bar, but good security principles and approaches are just as applicable to cloud environments as they are to tradition ...
Posted 14 November 2011 by Cloud Security Alliance (CSA)
0
comments
By Allen Allison Regardless of your industry, customer base, or product, it is highly likely that you face regulatory compliance requirements. If you handle Protected Health Information (PHI), the Health Insurance Portability and Accountability Act (HIPAA) – along with the HITECH enhancement ...
Posted 04 November 2011 by Cloud Security Alliance (CSA)
Showing 1 - 20 of 80 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×