Infosecurity Blogs

Biometrics: the New Frontier in Security, but Why Aren’t We There Yet?

Biometrics: the New Frontier in Security, but Why Aren’t We There Yet?

Biometrics is often considered to be the cutting-edge technology that the security industry needs to adopt to help drive innovation in the digital age

#ISC2Congress: How to Hire and Get Hired in Infosec

#ISC2Congress: How to Hire and Get Hired in Infosec

The session contained a lot of really useful insight and advice on how to hire, and get hired, in information security.

#ISC2Congress: How to Mentor an Information Security Professional

#ISC2Congress: How to Mentor an Information Security Professional

Jeff Silver, senior security engineer at RSA corporation, gave a talk at (ISC)2 Congress in Orlando, Florida, on how to build up infosec professionals through mentoring programs.

#CLOUDSEC2016 : Tenacity and Problem-solving Trump CISSP, says Rik Ferguson

#CLOUDSEC2016 : Tenacity and Problem-solving Trump CISSP, says Rik Ferguson

At CLOUDSEC in London on 6 September 2016, Rik Ferguson, VP president security research, Trend Micro, presented in a session titled ‘Take Control: Empower the People’

How Businesses Can Combat Cybercrime and Win the 'Cyberwar'

How Businesses Can Combat Cybercrime and Win the 'Cyberwar'

Data protection and security concerns around mobile devices are two serious cybercrime issues businesses both large and small must realize, while already happening today, are going to become even more prevalent tomorrow

Gotta Hack em’ All: Pokémon Go, Security and Privacy Awareness

Gotta Hack em’ All: Pokémon Go, Security and Privacy Awareness

The Pokémon Go incident served as a litmus test of where the average person stands in terms of their security and privacy awareness

Top Tips to Keep the Hackers at Bay

Top Tips to Keep the Hackers at Bay

What was once a couple of physical doors that kept your office safe is now a multitude of virtual doors that you can’t control

There's No David vs Goliath in Cybersecurity Innovation

There's No David vs Goliath in Cybersecurity Innovation

Cybersecurity needs new and radical approaches, as well as rethinking and re-engineering. This is tough for established organizations to take on board and put into practice, but it’s exactly what start-ups do best

As Hackers Target US Election, Onus is on Security Pros to Protect Data

As Hackers Target US Election, Onus is on Security Pros to Protect Data

The possibility of hackers using malicious, electronic means to interfere with the election process marks a game changer for information security professionals

In Cybersecurity Hiring, Aptitude Trumps Experience and Skills

In Cybersecurity Hiring, Aptitude Trumps Experience and Skills

As a hiring manager, you may be presented with a choice: hire the candidate with the most experience or a natural ability to get things done. While tenure is the indicator of expertise in many careers, the case can be made for hiring based on aptitude versus experience in cybersecurity

#BHUSA Dropped USB Experiment Detailed

#BHUSA Dropped USB Experiment Detailed

Earlier this year, a whitepaper was released which revealed the results of an experiment where malicious USB sticks were dropped around the campus of the University of Illinois.

A Day in the Life of an IT Pro: Hacked off with IoT

A Day in the Life of an IT Pro: Hacked off with IoT

I know the topic of connected fridges and the like is often covered, but amid the cacophony of excited consumers is a warning – the impact of IoT on enterprise security could be monumental.

What’s Hot on Infosecurity Magazine?