Infosecurity Blogs

Data-First or Employee-First?

Data-First or Employee-First?

One only has to look at the imbroglio that surrounds a breach like Target to see that we are in a new era

Don't Worry About The Government: Quis Custodiet Ipsos Custodes

Don't Worry About The Government: Quis Custodiet Ipsos Custodes

The phrase ‘just because you’re paranoid doesn’t mean they’re not out to get you’ has become something of a hoary old cliché. But for UK MPs, the phrase has a very contemporary and relevant meaning

Closing the Net on Attackers

Closing the Net on Attackers

It’s become a consistent adage in security that defense no longer stops at the perimeter. There is so much more to consider in a modern ‘defense in depth’ security posture

In Every Dream Home a Security Heartache

In Every Dream Home a Security Heartache

What more can you say about the connected home environment? Well when it comes to security, quite a bit really

The Pitfalls of Password Strength Meters

The Pitfalls of Password Strength Meters

Can you rely on algorithms and strength meters to confirm the strength of your passwords?

Acumin: Salaries Rising Across the Security Sector

Acumin: Salaries Rising Across the Security Sector

Acumin’s annual Salary Index for the UK information security industry collates salary data on a breadth of job functions and professions, based on engagements of live roles from the last 12 months

Returning to Bletchley Park

Returning to Bletchley Park

Peter Berlich pays a visit to the National Museum of Computing

Securing Joined-up Government: the UK’s Public Service Network (PSN)

Securing Joined-up Government: the UK’s Public Service Network (PSN)

UK government organizations, and those that have a need to interact with them, can apply to join the UK Public Service Network (PSN). However, to do so they must be able to ensure and prove their use of the PSN is compliant. Network access control (NAC) technology helps achieve this goal

When Good Code Goes Bad

When Good Code Goes Bad

A June 2015 analysis of over 100,000 software development organizations reveals average downloads of known vulnerable software components exceeds 15,000 annually

A Passion for Online Safety, Part 4

A Passion for Online Safety, Part 4

In the fourth and final part of

3 Qualities of Effective IT Security Managers

3 Qualities of Effective IT Security Managers

The role of the IT security manager is getting ever-more complex. Increasingly relied on by the business to safeguard valuable assets while enabling digital innovation and flexible working practices, it's fair to say that information security is now more mission-critical than ever. So how can IT security managers rise to the new challenges they face?

Mobile Payment, Your Time has Come

Mobile Payment, Your Time has Come

2015 will be the year when the floodgates open on contactless mobile payments

What’s Hot on Infosecurity Magazine?