Infosecurity Blogs

Just listen to teacher

Just listen to teacher

I have written a lot about network security and how to track down rogue issues during this series. However, as an IT Pro my role is also to advise and teach those around me about the pros and cons of adopting new technologies.

Mr. President, Backdoors are Stupid

Mr. President, Backdoors are Stupid

As pressure mounts in the US to pass laws requiring tech companies to include backdoors in their technologies, tech companies push back with a letter to President Obama.

The Great Schism: Cybersecurity in Fact and Fiction

The Great Schism: Cybersecurity in Fact and Fiction

Carey Nachenberg's new novel raises questions about the relationship between fact and fiction in security

In Security, Stay Lean!

In Security, Stay Lean!

A security function should be lean and focused on managing controls. Tendencies to expand its scope, grow in size to become top-heavy, or allow overly hierarchical structures to develop, are potentially harmful

Dealing with Information Overload

Dealing with Information Overload

Events and conferences come thick and fast in the security industry, and it’s sometimes hard to find time to sit and reflect on each one

Goodbye For Now

Goodbye For Now

As I get ready to send to press what will be the last issue of Infosecurity that I work on for a year, allow me to indulge in a trip down memory lane as I pick nine of my favourite memories from my nine years at the best information security magazine and news site there is.

A Day in the Life of an IT Pro: Poisoned by the Ethernet

A Day in the Life of an IT Pro: Poisoned by the Ethernet

As I’ve previously mentioned, being an IT Pro can often require some super sleuthing. Sometimes this can be through the actual systems and networks, and sometimes it means donning the cloak and hat and physically hunting down the issue.

The Rise and Rise of Bad Bots – Part 2: Beyond Web-Scraping

The Rise and Rise of Bad Bots – Part 2: Beyond Web-Scraping

Some bots have good intentions when they visit your web site, but many do not. How do you tell good bots from bad bots and control or block them?

The Rise and Rise of Bad Bots – Part 1: Little DDoS

The Rise and Rise of Bad Bots – Part 1: Little DDoS

Bots do many useful things on the web, but all too often they are up to no good. This two part blog starts but looking at bot-driven denial of service and the growing problem of short duration distraction attacks.

#RSAC: Android: Malware? What Malware?

#RSAC: Android: Malware? What Malware?

Android malware (or Potentially Harmful Applications): a problem, or overstated?

Online Security in the Insurance Sector

Online Security in the Insurance Sector

By admission of its own IT leaders, insurance companies are less advanced when it comes to IT security than banks. There are plenty of reasons to catch up.

What’s Hot on Infosecurity Magazine?